Data Snatchers
Guy Fuller
Learn how you can layer cyber protection commensurate with ever-changing cyber threats
The year is 1956, the location is Santa Mira, a small California town. Several patients of Dr. Miles Bennell (played by?Kevin McCarthy) claim that their loved ones have been replaced by impostors who look, sound and otherwise are exactly like their counterparts, except for one major detail - they are completely devoid of any human emotion. Dr. Bennell initially?diagnoses?those patients as suffering from some type of mass?delusion. Soon, however, he discovers that Santa Mira is really being quietly invaded by seedpods who replace their replicas while sleep. Severely sleep deprived and with no else in Santa Mira not compromised by the giant seedpods, Dr. Bennell narrowly escapes as the entire town is in hot pursuit to prevent him from reaching the highway to tell what he knows.
Dr. Bennell does his best to convince responsible authority figures that he is in fact sane and Santa Mira and ultimately everyone is in grave danger if this threat is not contained. Exhausted and near collapse, Bennell can no longer go on and his last words are, "whats the use". Finally, word comes in that a truck coming from Santa Mira is t-boned, flips over and seedpods (seedpods are the key to stealing others identity) are strewn all over the highway, it is only then that the authorities recognize that the threat is legitimate.
There are some interesting similarities between this movie- "Invasion of the Body Snatchers" and what we are seeing on the world scene- "Invasion of the Data Snatchers". Dr. Bennell is akin to information technology professionals trying to reason with and convince senior management that their respective companies are figuratively sleep from a cybersecurity respective. The seedpods represents cyber warfare in all its various forms. Juxtapose everyone else in this sci-fi thriller, as the disbelieving company who can't fathom that they could possibly be a ransomware target only to awaken and never be the same as before.
Why Some Don't Respond
Note what Benjamin Dean, a fellow for Internet governance and cybersecurity at the School of International and Public Affairs has to say. He concludes that some corporations have little financial incentive to do so. Dean analyzed the financial reports of several corporations that experienced large-scale data breaches in recent years. He referenced the Target hack of 2013 where forty million credit card numbers were compromised. He estimates that Target spent $252 million investigating the breach, repairing its network, and settling customers’ lawsuits, but Target recovered most of those losses in insurance reimbursements and tax reductions that are available to companies victimized by fraud. In the end, Target absorbed just $105 million in damage, peanuts for a company of this size.
Other Reasons Emerge For Not Investing...
领英推荐
What The Near Future Holds For Cybersecurity - It Isn't Pretty
It is important to remember that the United states and Russia are competing for world domination. Cyber warfare is a significant piece to this puzzle. Cyber?warfare between these and other countries is a 24x7 unrelenting enemy. In perpetuity, sponsor stated destructive computer programs are designed to damage economies and political systems. U.S. companies are expected to endure over 65,000?ransomware attacks?this year — and that's “a conservative number,” John Chambers, former CEO of Cisco Systems told Yahoo Finance Live. The hacks, successful or otherwise will continue as long as the two dominant world powers, US & Russia remain.
The data invasion is a reality. Dr. Bennell screamed to anyone who would listen - "They're here already! You're next! You're next!"
Where do you see the current crisis headed?
Certified Adult MHFA Instructor at National Council for Mental Wellbeing and Secretary for the Hudson Valley NY Hospital Liaison Committee for Jehovah’s Witnesses
3 年Thanks Guy for sharing. It was a fascinating article to read and amazingly similar to that old movie concept.
Enthusiastic, motivating trainer as well as Safety support for OSHA compliance. Accomplished writer for articles, blog posts, and voice over
3 年nice article