Fear and hacking in the cyber age (Or how security is about to get a lot more challenging)

Fear and hacking in the cyber age (Or how security is about to get a lot more challenging)

Sony Pictures, Yahoo, Hillary Clinton: A barrage of cyber-attacks in recent years has raised new concerns about the safety of individual and corporate data.

Brace yourself for more.

As the digital revolution moves to Internet-connected appliances, vehicles and machinery, it threatens to unleash a new wave of cyberattacks. The hackers are getting more sophisticated, too.

Those were among the warnings raised at the latest #RBCDisruptors, our monthly session on the biggest trends on the digital landscape.

The session featured Nir Zuk, co-founder of Palo Alto Networks, and Alex Dyner, head of special projects at CloudFlare.

Palo Alto Networks builds enterprise-grade firewalls and network security systems, which can help prevent and lessen the damage from intrusions and data breaches. CloudFlare’s cloud-based technology keeps its customers’ websites online and secure by mirroring their data over a worldwide network of servers, so if one goes down another can easily take its place.

Here are the highlights of the conversation:

1. Beware the hacker in your fridge
It’s no longer just the supercomputer in your pocket; connected devices are the new cyber-threat. From security cameras to lightbulbs, research firm Gartner says there are now 6.4 billion devices connected to the Internet?—?more than double the number in 2012. And every one could be vulnerable to a cyberattack.

Among the challenges, this new generation of connected “things”?—?refrigerators, pipelines, airplanes, machinery — is not designed by cyber-centric companies like Microsoft or Apple. Instead, the Internet of Things is mostly being built by traditional manufacturers.

“The companies and the people making those products are not in the business of security,” Dyner said.

Zuk said the new wave of connected-home devices are prime targets for cyberattacks?—?and a new age of ransom.

“If your refrigerator locks, would you pay $10 to unlock it?” he said. “You probably have more than $10 of stuff in it right now, so of course you’ll pay and open it. They do that across a million refrigerators, they make $10 million.”

Think of it this way: Even if an IoT manufacturer releases security updates, when was the last time anyone thought to update the firmware on a security camera?

2. They’re after your data, dude
We pay for free online services such as Gmail and Facebook with our personal information, which companies use to generate financial gain, be it through micro-targeted advertising or online recommendations.

Data is the new currency, and it’s what hackers want.

“The more data you have, the more potentially the attacker can get out of the attack,” Zuk said. “That means they will spend more money on the attack, which means that you need to increase the cost of that attack the more data you have.”

Zuk said the attacks his company focuses on?—?phishing scams that steal passwords, malware that encrypts user data and blackmails them to unlock it?—?are mostly done for financial gain.

Dyner said his company deals with different kinds of attacks, and motivations can be much broader. He pointed to a cyberattack on a series of Turkish escort websites that came from servers in a more conservative part of the country.

“Money is often a driver,” he said. “But people are willing to make statements and often do that as well.”

3. Hacking is big business
CloudFlare uses its decentralized, cloud-based architecture to provide cybersecurity as a service, a business model being adopted by many in the industry. Yet hackers are evolving, too, and have begun to pursue a similar model in which they sell their services to third parties in return for a chunk of the proceeds.

Zuk pointed to the example of CryptoLocker. The name refers to a collection of malware that locks down a users’ hard drive with nearly unbreakable encryption and asks them to pay a fee ranging up to tens of thousands of dollars to unlock it, usually in Bitcoin or another untraceable digital currency.

“There’s a small group that’s building all the infrastructure,” he said. “If you’re a criminal, you buy the services from them. You choose which targets to attack, and you pay them a cut.”

Those who build the infrastructure even have a telephone support centre, he added, with full-time workers who will walk criminals?—?and victims?—?through the process of getting the ransom.

4. The war’s just beginning
While cyberattacks aren’t going away, both Zuk and Dyner said there was much people could do to prevent breaches and limit potential damage.

First thing to do is to not blame the victims, Dyner said, because any system that involves human beings is inherently fallible.

He said CloudFlare regularly sends its phishing emails to its own employees to test its defences, and always gets hits.

“It’s not that they’re stupid, it’s that they’re busy,” he said of his employees who get caught in a phishing trap.

The second thing, he said, is for businesses and organizations to stop thinking of IT and cybersecurity as a cost centre.

The most successful companies, he said, “think of technology as a core competency.”

Trouble is, few companies can find anywhere near enough people to fill the cyber-security jobs created in recent years.

Zuk said it’s not uncommon for employers to have a 40% vacancy rate in cybersecurity positions.

5. Making security easy
A big challenge for security: making it easy. Building a complicated and unfriendly system that encourages users to take shortcuts?—?writing a password down on a Post-It, say, or using the same details for every system?—?can weaken security, no matter how well the rest of the system is designed.

Dyner said it was important not to let security get in the way. He pointed to two-factor authentication, which pairs a password with another form of verification such as a code delivered by text message, as a relatively easy and painless solution.

“It’s not that big of a deal to make people take out their phones, and it goes a long way towards making the system more secure,” he said. “You can do things in a way that allows people to be effective at their core tasks throughout the day.”

Another option is to piggyback on existing tools such as Dropbox or Facebook Messenger that have incredibly strong built-in encryption. That can go a long way to satisfying customers and digitally-savvy employees.

“Customers will not come to you,” Zuk said. “And you won’t be able to hire people if you put too many restrictions around what they do or what they can’t do.”

要查看或添加评论,请登录

John Stackhouse的更多文章

  • Notes from the frontlines of an investing inversion

    Notes from the frontlines of an investing inversion

    I was in New York this week at our annual RBC Capital Markets’ tech conference, and caught up with a range of founders…

    11 条评论
  • 5 Trump cards that could shape 2025

    5 Trump cards that could shape 2025

    That week was quite a year in politics. The Trump sweep – was that just a fortnight ago? – looks like small ball…

    17 条评论
  • My monthly book blog: The fire inside

    My monthly book blog: The fire inside

    Nature has a way of speaking to us. If only we would listen! This summer, nature delivered some harsh messages, and a…

    14 条评论
  • A river runs through it: What this election tells us about America today

    A river runs through it: What this election tells us about America today

    T-10 to E-Day and do we know anything more than a month ago? Maybe not on the likely outcome, or how those celebrated…

    21 条评论
  • The new climate in Ottawa

    The new climate in Ottawa

    I was in Ottawa this week, and sensed more than the seasons were changing. The political winds of change can be felt up…

    12 条评论
  • A new energy in Calgary

    A new energy in Calgary

    Calgary’s official slogan is “Be Part of the Energy.” I spent the past few days there, for the Energy Disruptors Unite…

    10 条评论
  • My monthly book blog: Freedom, fascism and false hopes

    My monthly book blog: Freedom, fascism and false hopes

    Freedom may be the Word of the Year in 2024 — a year with a record number of elections, and it would seem a record…

    1 条评论
  • A New York State of Climate

    A New York State of Climate

    There’s no more competitive place on Earth than New York City—“if you can make it there, you can make it anywhere”—and…

    1 条评论
  • The new economics of AI

    The new economics of AI

    A decade ago, I was part of a deep discussion led by Ajay Agrawal and Tiff Macklem, on the potential of artificial…

    7 条评论
  • A new course for our colleges and universities

    A new course for our colleges and universities

    Our colleges and universities are among the greatest forces of change in society. They have been for centuries.

    9 条评论

社区洞察

其他会员也浏览了