It has been quite the year for cybersecurity breaches, be they personal or corporate, with companies from Sony to TalkTalk caught up in scandals.
A week ago, TalkTalk was hacked big time, with personal details of customers accessed and countless questions asked. This isn’t a new thing, though. Taking just the second half of this year, we’ve seen Apple’s App Store hit by malware apps, not once, but twice.
Adding apps that are dodgy might not constitute a real cyberattack but, considering we’re all online, all the time, the umbrella quickly widens.
In autumn, a Russian team hacked into legitimate satellite internet connections to mask the location of its command-and-control servers. Ashley Madison was also hacked, and it’s fair to think everybody knows what went on there by now.
The IRS in the US was hit hard when more than 300,000 accounts were compromised. Carphone Warehouse was hit when 2.4m customers had their details stolen. Yahoo got done by mass malvertising and the Pentagon felt the wrath of a targeted email campaign.
That’s before we look at the fallout from last year’s Sony hack, which rolled on into this year, and the countless businesses all over the world that have come under attack.
Pretty soon cybersecurity threats are going to come into our homes as the internet of things revolution starts to take hold but, for now, what can businesses do?
Well, becoming aware of the threats, accepting certain inevitabilities and securing key documentation above all else would be a good start.
But why not learn from those in bother? Here, via behaviour analytics company Exabeam, are four real examples of CSO enduring nightmare scenarios. If the writing is too small to read just click on the article to view in a larger format.
Nightmare image via Shutterstock