Companies Should Tackle Cybercrime & 'take the fight to the criminals'

Firms must “take the fight to the criminals” to prevent a rising tide of cyber-attacks by sophisticated organised crime gangs.

In a joint report, telecoms group BT and consulting firm KPMG called on companies to address the “industrialisation of cybercrime”, warning against the danger of overplaying the more high-profile threat of lone hackers.

The report warns that today’s cybercriminal often works for complex operations akin to businesses, with human resources divisions and budgets for research and development.

Some are so sophisticated that they are able to hijack senior executives’ email accounts and fake correspondence to convince junior company employees to approve transactions. In one such case, the scam led to one company agreeing to pay out $18.5m (£13.9m) to criminals in the Asia-Pacific region, BT and KPMG said, without identifying the company.

Businesses must work with law enforcement against such operations, the report said, and should consider launching their own pre-emptive attacks against cybercrime networks.

Mark Hughes, chief executive of cybercrime at BT, said it was vital that companies “take the fight to the criminals”. “The industry is now in an arms race with professional criminal gangs and state entities with sophisticated tradecraft,” he said.

“The twenty-first century cybercriminal is a ruthless and efficient entrepreneur supported by a highly developed and rapidly evolving black market. Businesses need to not only defend against cyber-attacks but also disrupt the criminal organisations that launch those attacks.”

But Hughes said the industry’s efforts to tackle the problem are being hampered by a lack of graduates with the right skills to work in cyber-defence. BT has identified cybersecurity as a huge potential growth area, with revenues from its cybersecurity division increasing at more than 10% a year.

In April, the telecoms giant announced plans to hire 900 people for its already 2,500-strong security team to cope with growing demand.

The BT-KPMG report found that while 97% of firms have suffered a cyber-attack, only a fifth of technology chiefs at those firms felt well enough equipped to deal with organised cybercrime.

The skills deficit persists despite the importance of cybersecurity to major corporations being underlined by several high-profile security breaches.

Broadband and telecoms provider TalkTalk lost more than 100,000 customers and faced a bill of at least £60m in the wake of a cyber-attack last year that saw thousands of users’ data harvested.

Ashley Madison – a US dating website aimed at people looking for extra-marital affairs – was hit by an attack that saw thousands of users’ dating profiles leaked online.

Guardian

« EU Signs Cyber-Security Agreement With Industry
Pentagon Unprepared to Repel Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.