123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

More Robust Security Measures Required To Tackle Increase Of New Internet Security Threats

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Reports and analysis have proven that there have been a huge increase in the nature of cyber criminal activity ranging from identity theft to security breach, and the number will continue to increase if proper security measures are not taken.
What is important to note is the amount of losses has been quite substantial. Recently, About 90 percent of U.S. companies that responded to a Computer Security Institute survey said they had detected computer security breaches and 74 percent acknowledged financial losses as a result of the breaches of security.
Bradley Anstis, VP of technical strategy at M86 Security, a global provider of Secure Web Gateway solutions, says the cyber crime industry generates over $100 billion per year and organisations can no longer accept cyber crime simply as a cost to business
In the United Kingdom, the latest cybercrime cost estimates released by the Cabinet Office showed annual losses of more than $43 billion. Cybercrime is one industry that has shown double-digit growth for several consecutive years despite lingering global recession. Cybercrime has become more profit-driven, its ...
... "business model" has evolved, giving rise to new types of criminal activities and new twists on the old types.
Highly-motivated criminals are using tools that are getting easier for anyone to access and use, and this further widens the cyber crime problem. Panda Labs report that malicious software could be bought, if not freely downloaded, "to make big bucks stealing credit card numbers and other personal information."
According to PandaLab’s recent malware report, the number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, most of which were Trojans. Moreover, there was a 26 percent increase of new threats compared to the same period last year.
Trojans remain the most popular type of threat to computer systems, and now account for 70 percent of all new malware. It can be incredibly lucrative for cybercriminals to commit fraud or steal money from Internet users through the online banking channel.
Analysts have also noted a shift from Windows-based computers to other operating systems and platforms, including smart phones, tablet computers and mobile platforms in general. Smart phones and tablets increasing popularity means more and more people are carrying miniature computers with them everywhere they go and using them for more of their daily tasks including financial transactions.
An information intelligence solutions company, Detica, which collaborated on the British government report with the Office of Cyber Security and Information Assurance in the Cabinet Office, said most of the cybercrime costs were being shouldered by business. The report also mentioned that the real impact of cybercrime was likely to be much greater than that estimated
Meanwhile, according to Antis, “Since 2007, the security market has grown 41%, and this is compared to cyber crime that has conservatively grown 376%. “Ideally, security researchers are able to plug gaps before they are used for attacks, but this does not always happen; look at the problem with zero-day vulnerabilities. Security researchers have to use every tool in their arsenal against cyber criminals.” said Antis
More awareness of security issues and incidents only demands on organizations to secure its information security environment. These report findings clearly indicates that data breaches are very common these days. One way to mitigate information security risks is with technical security training. EC-Council’s brand new TakeDownCon is a technical information security conference series, in addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world’s most comprehensive ethical hacking training program.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals and certified more than 38,000 security professionals. These certifications are recognized worldwide and have received endorsements from various government agencies including the US federal government, National Security Agency (NSA), Committee and National Security Systems (CNSS), US Army, FBI, Microsoft and CERTs (Computer Emergency Response Team) of various nations. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.

Total Views: 188Word Count: 841See All articles From Author

Add Comment

Computers Articles

1. Contract Hiring Mobile App Developers In 2024-25
Author: SpryBit Agency

2. Hiring Developers On Contract : Freelance Platforms Vs It Agencies
Author: SpryBit Agency

3. Lexicon Systems: Best Partner For Hardware And Computer Rentals Across Tamil Nadu
Author: HubraSEO

4. Student Engagement – What Universities Must Know And Do
Author: Engage2serve

5. Understanding The Importance Of Software Testing In Development
Author: Xsosys Technology(S) Pte. Ltd.

6. The Importance Of Iso 27001 Consultancy For Secure Business Operations
Author: Qadit

7. Transforming Industries: The Power Of Automation And Robotics Services
Author: andrew smith

8. Businesses Should Work With Hipaa-compliant It Services
Author: Daniel Jones

9. 5 Sketch Plugins You Need To Succeed
Author: goodcoders

10. Best Practices For Building A Successful Enterprise Software
Author: goodcoders

11. 10 Best Open-source Test Automation Frameworks
Author: goodcoders

12. Whatsapp Api | Understanding Messaging Types In Whatsapp Api Services A Comprehensive Guide For Businesses | Whatsapp Chatbot For Insurance
Author: AskEva

13. Benefits Of Upgrading To Ethernet Cable
Author: Jennifer Truong

14. Best Software Company In Lucknow
Author: SigmaIT Software Designers Pvt. Ltd.

15. What To Expect From The App Store And Google Play Store When You Launch Your First App? Previous Next View Larger Image
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: