in

AFCC: Coordinated Effort Needed to Stop Cyber Crime

AFCC: Coordinated Effort Needed to Stop Cyber Crime - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

Sam Curry, RSA
Sam Curry, RSA

The Anti-Fraud Command Center recently noted that cyber criminals now understand the importance of information that can be stolen from businesses.

Sam Curry, VP of product management and strategy for RSA, said crooks are going beyond simple theft, according to Computerweekly.

Curry added that thefts of intellectual property, strategic planning and other essential information like email addresses were snowballing. Fenced email addresses of top-ranking executives at U.S. corporations are worth nearly $50, and increasing thefts mean phishing attacks may increase long term.

State-of-the-art fraud-as-a-service technology is the impetus of this trend because it is an existing efficient, sophisticated, and monetized information stealing and fencing infrastructure.

According to the RSA AFCC report for May 2009, the developing trend is a signpost of more damaging things to come, such as the integration of fast-flux botnets in attack techniques, a booming trade in money-mules, improvement in Trojan functionality and infrastructure and advancement of fraud-as-a-service.

The AFCC also said phishers and malware authors were targeting online businesses and evolving rapidly with advanced software to keep pace with the legitimate cyber world and its efforts to thwart them. Cyber criminals learn with each successful attack, honing their attack tools so that each effort is more efficient and profitable than the last.

After intensive analysis, Curry states that the situation is getting worse due to the over-abundance of attention to security systems of organizations or companies. Most of the practitioners do not concentrate on “front-door” attacks on security infrastructure, like cracking complex security protocols, because “backdoor” attacks through email phishing or Trojan infiltration yield less risk and the same rewards, so the human element of cybersecurity is just as important as a tight, well-maintained firewall.

Finally, no corporation is an island, so any entity seeking to make IS airtight should seek advice from comparable organizations or industry experts. A well-rounded, open, communicative approach will enable companies to identify the security vulnerabilities and address them.  In the close quarters of cyberspace, an attack on one is an attack on everyone.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Admin

Vinton Cerf, Internet Father: Outer-Space Tech Will Solve Cyberspace Problems - top government contractors - best government contracting event
Vinton Cerf, Internet Father: Outer-Space Tech Will Solve Cyberspace Problems
Cyber Czar: the Contenders - top government contractors - best government contracting event
Cyber Czar: the Contenders