Picture this, you have all the locks fitted on your front door, but your next door neighbour (sharing a common wall) has almost non-existent security. Could a burglar get to your stuff?
In today’s world, we are all connected in cyberspace, just like the next door neighbour and just not through a common wall. Bluetooth, Wi-Fi or maybe a wired connection can all be an open access not only to our data but to others as well. What if we used our insecure smartphone to access corporate data, while someone sitting a few feet away then piggybacked on our device and accessed the data?
So now not only have we exposed our data but at the same time created an easy access. What if the latest app that we downloaded for free was not an innocuous app but in reality a trojan that will transform our device into a spy phone for other foreign powers? While BYOD (Bring Your Own Devices) to work is the most logical thing to do, organisations are rushing to secure this space.
From 1970 the internet aka cyberspace has grown from 40 users to just about 2 Billion (2010) according to the Google/WorldBank data. This is now termed as the most complex man-made universe as we know it – Cyberspace. 800 million smartphone users (2011), 12 Billion devices connected online and this will soar even further. The number of internet connected devices is set to explode in the next four years to over 15 billion – twice the world’s population by 2015.
Cyberattacks occur almost every hour, for example in Israel alone 1000 cyber attacks take place every minute, smaller cities in India face a higher threat. The cost of cybercrime in Europe alone is a staggering 750 billion Euros a year. Several cyberintrusions have been reported against government systems, banking systems, utility services communications, defence contractors and security companies.
The firmware and applications may have flaws and vulnerabilities that could enable hackers to gain access to your digital assets or even use your device to launch an attack. A KPMG survey showed that 83% of respondents felt that mobile employees and home workers using the same IT hardware for business and personal use will contribute to an increased e-crime risk for the organisation. The survey also showed that 92% believed the use of consumer oriented IT hardware with internet connectivity such as smart phones and tablet computers, for business related purposes will contribute to an increased e-crime risk for the organisation.
The question is: How can you secure your family, organisation and nation from this growing peril that threatens to destroy, manipulate and render your digital data inaccessible or your private personal information right there in the open for the world to see? Safeguarding your digital assets will be the most important thing that you can do!