The report of the new company, “Symantec” to be the hallmarks of online criminals have emerged through a series of cyber attacks are most damaging in history, and after that gone into hiding over the first ten months of the year 2013.
Showed “Report Symantec about security threats on the Internet”, version 19, and the presence of a significant change in the behavior of cyber criminals, where the detection of planning hackers for several months before Hnhm for large-scale attacks and unprecedented, instead of doing strikes a quick yielding smaller.
In this context, he said, “Amer Shibaro”, Regional Director for the Gulf and Levant at the company, “Symantec,” The losses resulting from breaches a big draw in the $ 50-a small offensive. In spite of the growing complexity and advanced technologies that use by the attackers, but that it is surprising that observed during the course of the past year was the ability to adjust their activity and patience waiting for a target yield bigger and better, as he put it.
According to the report of the company, saw the year 2013 rose by 62 per cent in the number of security breaches of the data from the previous year, which led to the disclosure of personal data of more than 552 million users, indicating, according to the “Symantec”, to the size of the real danger that cause by cyber crime and the growing threats to consumers and businesses alike.
He wrote, “Ed Ferrara”, vice president and senior analyst at the Foundation, “Forrester” Research, demonstrates this point, saying: “Addressing security incidents objectively promotes, in fact, the look of the customers of the company, but processed in a non-professional, it is reflected in the company’s disastrous results. In the case of lost customer confidence in the company because of the way circulation to their personal data and their own information, they simply will turn to another company. “
Mention that the classification UAE improved during the year 2013 in the field of vulnerability to security threats on the Internet, where the fallen from world ranked 41 in 2012, occupies a Grade 47 in 2013.
This indicates the change to decrease the number of security threats in all categories except for e-mails annoying “spam”, which rose from 59th in 2012 occupies ranked 50 in the year 2013. While the proportion of malicious code and viruses “bots” and fraud during the year 2013, which contributed to the decline in rating Emirates globally in the three areas of the former mattress 26 to 29, and from 27 to 31, and 51 to 79 in a row between 2012 and 2013.
Has attracted small businesses in the UAE, which has between 1-250 employees most frauds and attacks directed through the year 2013. Targeted fraud and attacks directed mainly sector financial institutions, insurance companies and institutions, real estate, and so at rates exceeding 40 per cent, and then many of the other sectors injury rates of less than 15 per cent.
The report pointed to overcome the size and scope of security breaches all expectations, which displays the status and reputation of the companies at risk, as well as the target of personal information of consumers increasingly, from credit card numbers, medical records and access to passwords and bank account details. Each process breach of security data from operations during the first eight seed in 2013 resulted in the loss of tens of millions of data records, while managing the process of penetration and only one of this limit is reached during the year 2012.
He Shibaro saying: “Nothing breeds success like success, especially if you are from cyber criminals, Voaam pay huge salaries carry an implicit reference to the expectation that large-scale attacks. So, should companies of all sizes to reconsider and think about this, and even restructure their security measures. “
Globally, it has increased the frequency of attacks by 91 percent, and continued for a period three times longer compared to the attacks of 2012, while considered a career personal assistant and work in the field of public relations more Mhuntan targeted by cyber criminals, who Astkhaddmoheme as a starting point towards more goals payoff such as a celebrity or business.
In spite of the increasing flow of data from smart devices, applications and services direct contact over the Internet attracts and tempts cyber criminals, but it can businesses and consumers to better protect themselves through simple steps, whether against data breaches large, or targeted attacks, or e-mails annoying “spam “.
And recommends that “Symantec” to apply protective measures such as “Knowing Me” – for companies – where companies must focus protection on the information, not the device or data center, they must locate and track the flow of critical data in the company, to help you choose the best policies and procedures in place to protect them.
It also recommends that “Symantec” companies to educate employees, such as providing the necessary guidance on how to protect the information, including educating employees about company policies and procedures in place to protect critical data and equipment company.
The company considers that companies must apply the procedures for strong security, such as strengthening the security infrastructure against data loss, network security, and security peripherals, and policies encryption, authentication procedures powerful, and defensive measures, including the use of techniques popular in this area.
For consumers, Vetosém “Symantec” access to the experience and knowledge necessary security measures, where longer passwords, keys to the kingdom of the default user – as she put it – so he should use special software to password management in order to create strong passwords and unique for each site is visited, and the preservation of organs, including smart phones, the latest updated versions of software security protection.
Users should take caution, in terms of reviewing bank statements and credit cards to verify the existence of any violations, and be cautious when dealing with e-mails annoying or unexpected, as the company sees the need to beware of offers online that looks very attractive, usually hiding behind a threat security.
The user must also know the other side, and see the policies of retailers and online services that require submission of personal information or bank account to take advantage of them. The best way to do this is to visit the official website of the company directly “without doing by clicking on the link contained within the e-mails”, and in case you had to provide important information and personal.