World Economic Forum Says Cyber-attack Is A Top Risk To Business.

The World Economic Forum (WEF) has listed cyber-security as one of the greatest threats to business around the world. In the Global Risks Report, the annual study of what the WEF fears and what the forum feels the world should fear, cyber-security has made its third appearance.

The category finds itself ranked fairly high, above food crises, interstate conflict, terrorist attacks and spread of infection diseases but below climate change, fiscal crises and mass migration.

In 140 economies, the report notes, cyber-attacks rank in the top ten threats. The United States is considered to have the most to be concerned about given the effects cyber-threats can have on  the economy.

Economies increasingly reliant on connected technologies, like Asia and Europe, are predictably worried as well. It's a concern that will only grow with those connections, the report notes: “As the Internet of Things leads to more connections between people and machines, cyber dependency – considered by survey respondents as the third most important global trend – will increase, raising the odds of a cyber-attack with potential cascading effects across the cyber ecosystem.”

As cyber-dependence rises, the report adds,  “the resulting interconnectivity and interdependence can diminish the ability of organisations to fully protect their entire enterprise.”

There are two particular areas of concern, the report says, that organisations often overlook: mobile internet and machine-to-machine connections.  The report says it is vital “to integrate physical and cyber management, strengthen resilience leadership and organisational and business processes, and leverage supporting technologies”.

While the report clearly states cyber-security as one of the main threats to economic stability going into 2016, worry has diminished since the category was first introduced into the annual report in 2012. Back then, cyber-security came 4th in the top five global threats in terms of likelihood, it disappeared from the ranking in 2013 and then came back at fifth place in 2014. It has not ranked in the top five most likely global threats since then.

This high estimation of cyber-threats, notes the report, may be down to the fact that large data breaches are finally creeping across newspaper headlines and into the public imagination as a more present danger, than it might have otherwise been. In fact, considering the global risk report is gathered from interviews, we might also say that this particular report is just as much a catalogue of global fears as it is actual global risks.

Norman Shaw, CEO and founder of ExactTrak, told SCMagazine UK.com, “This is a really positive thing actually, because there's still some enterprises, and some employees within those enterprises who don't take data protection and cyber-security seriously, despite the mass media reporting it on almost daily.”

For example, said Shaw, “Employees can also use the same passwords for work as they do for everything else, including their personal devices and accounts which are often not subject to much security, making it easy for hackers to find a way into the corporate data.”

He added: “More awareness of how serious the problem of cyber-security is can only be a good thing.”

Tim Grieveson, Hewlett Packard Enterprise's chief cyber strategist, enterprise security products, said: “Businesses need to understand that it's not a matter of whether they will be breached, but a matter of when. As such, security professionals need to start thinking like an adversary to identify what data is most likely to be targeted and what tools are most likely to be used. Make the assumption you're going to be breached or have been but don't know about it yet, and look at how you can disrupt and manage the breach when it inevitably occurs.”

SC Magazine:

« 2016 Is On The Cusp Of A Machine Revolution
US Says China Stole Military Robot Designs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

Judy Security

Judy Security

Judy provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).