Technology has always been an innovative means to leverage competitive advantage in the marketplace. Technology has essentially provided the next evolution of business, interconnecting global interests, and promoting commerce faster and more efficiently than had previously been achieved.
As a result, companies have become more technology dependent as well as driven, fostering a need for the most advanced technology to support their business infrastructures. Technology has provided opportunity for smaller businesses to compete on the same playing field as larger competitors.
E-commerce has enabled companies to provide greater exposure to a more diverse and expansive customer base; it has provided a vehicle to quickly and easily purchase goods; and it has allowed companies to showcase the full repertoire of their offerings for sale. Those organizations that have been able to leverage technology effectively and maximize its benefits have been able to gain a competitive edge over its competitors.
As technology continues to provide that innovative edge, it also has introduced potential avenues that can be exploited by hostile actors seeking to take advantage of technology's greatest weakness - the vulnerabilities inherent in the software and hardware. Cyber criminal and cyber espionage activities have demonstrated that hostile cyber actors intent on gaining unauthorized access and exploiting technology will invariably find ways to accomplish their objectives.
The various tactics, techniques, and procedures employed by malfeasant individuals and groups have successfully compromised various technology platforms and operating systems. Point of sale systems, third-party networks, website injects, and watering hole attacks are just some of the proven viable vectors of attack that have exploited just about every industry in the public and private sectors.
Technology may have evolved our online experiences and enhanced the way we conduct the business in our personal and professional lives, but it has been a virtual Pandora's Box that has released detrimental and far-reaching cyber consequences.
We are still in catch-up mode, trying to instill cyber security awareness into our existences. On the business side especially, breaches have become almost a routine occurrence, garnering less surprise both in terms of the compromised and the amount of records compromised. According to one news source, there were more than a billion records compromised in 2014 from approximately 1,500 incidents, a 78 percent increase from the year before. What this means is that despite current cyber security efforts, the bad guys continue to outpace the defenders with their ingenuity, persistence, and patience.
In an environment where companies have to compete on a global scale, providing efficient, easy-to-use technology for consumers is not enough anymore to differentiate themselves from their competitors. Technology is but one part of the equation; another part is having the best talent available to run the technology, as well as an experienced staff to address security concerns and be able to act proactively to emerging threats as well as respond quickly retroactive to specific incidents.
Sign up for Computerworld eNewsletters.