After decades in cyber security for the Australian Government, we’re no stranger to the level of risks involved from cyber-attacks. In recent years, however, the attacks being made on commercial business has reached the same level of sophistication.
After decades in cyber security for the Australian Government, we’re no stranger to the
level of risks involved from cyber-attacks. In recent years, however, the attacks being made on
commercial business has reached the same level of sophistication.
National security or customer database, government department or financial transactions – it’s all data, it’s valuable, and it’s a target.
They’re organised, sophisticated, intelligent, and their most powerful weapon is stealth.
AsiaPacific companies receive a cyber threat every 10 seconds* and only 50% are being investigated**.
$1.3 Trillion USD was stolen in 2018 alone***. If ‘cyber-crime’ were a nation state, it would have the 15th largest GDP in the world, coming in right behind Australia.
1.9 billion records were compromised in the US in the first half of 2017, and if the trend continues, it’s heading for a 175% increase in one year alone****
*Cisco Asia Pacific Security Benchmark 2018 | ****Breach Level Index Report 2017
Illegal drug trafficking brought in $500 billion USD worldwide in 2018* , which is only 38% of the amount generated by cyber-crime during the same time. In other words, it’s a very profitable enterprise, and it’s driven by organised crime syndicates on a massive scale. Although there are still lone wolf operators out there, they’re comparatively insignificant in today’s environment.
Whether it’s a disgruntled employee, a simple mistake or an opportunistic theft, many of the breaches organisations experience come from within.
Considering they’re operating illegally, hackers are surprisingly open about how they go about their business.
- 70% can breach any market sector in 10 – 15 hours*
- 77% say they’re rarely identified a security team* *Nuix Black Report 2018
The question that might be more appropriate, is when will they get past the firewalls.
A determined and focussed attack will eventually breach any network. You need to determine what you’re going to do when it happens.Contact us, or call us and we’ll make a plan to protect you and your systems.