With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros.
1. Small things can become huge problems
In the age of big data, risk once deemed minimal may pose serious threats to companies concerned with keeping the information they’ve collected private, but that begins and ends within the companies and the parameters and protocols they have in place to keep data secure.
Nobody took the dragons or dire wolves seriously in the beginning of Game of Thrones, but by season 3 they were capable of wreaking havoc and wiping out armies.
Small issues can grow into serious complications If left unchecked.
Everything from employee access to information, to the changing of passwords on a regular basis is uniquely important. Businesses are using mobile systems more often everyday, but mobile security isn’t quite up to par with larger network security endpoints.
“I think it’s more dangerous in some ways with mobile systems that business endpoints do. Even home systems are better monitored to resist attack. Android has critical vulnerabilities,” said Gene Spafford, professor and executive director at Purdue University, Computer Software Consultant. “The trend is generally making mobile devices more powerful, all purpose computer systems, so the threat increases.”
2. Faceless men are everywhere
Anonymous has become synonymous with a global network of hackers, connected through common causes, and faceless men attempting to breach network security is nothing new. Legislators are almost always one step behind, while cybercriminals and hackers are always looking toward tomorrow and how to breach the security of tomorrow.
Much like the faceless assassins of the house of black and white who approach their victims anonymously through seemingly friendly interactions (Season 5 Episode 2), cybercriminals make common practice of seeking out and learning everything they can about a target before phishing for their information.
They may procure the information they seek by phishing for personal information via email, text messages and even phone calls. They will engage their victims slowly but surely taking each step as it comes, and using every bit of information given to their advantage in the retrieval of more.
While a skilled and more often than not lone hacker will often use their talents to breach the gates of companies and corporations alike for the simple purpose of retrieving information for the sake of access to information, networks of cybercriminals, or a particularly malicious individual will break into a network with the intent of interference, surveillance, counter surveillance, cyberlaundering, and the overall goal of bringing a company to its knees.
Sign up for Computerworld eNewsletters.