© Kıbrıs Haber Sitesi 2023

CYBER SECURITY AND COMPANIES

The growth and diversification of cyber threats

 

Cyber-attacks in 2011 and in recent months have contributed to bringing this threat to the forefront of the media scene.

 

In 2012, “cyber hacktivism” developed with the use of cyber weapons, which can be defined as computer codes used or designed to threaten structures, systems or living things or to cause physical, functional or psychological harm.

 

The worst-case scenario would be a threat to oil, gas and water companies that could take control of their equipment through hackers' systems.

 

Cyber-attacks threaten and destabilize the security of States, businesses and citizens.

 

This major crime of a new kind is based on increasing dependence on new information and communication technologies. Cyber ​​threats can be defined as the use of computer technologies in a way that harms a society's ability to maintain internal or external order.

 

The economic impact of cybercrime is arguably one of the most important issues. Estimating financial losses raises the statistical problem of this new type of crime that needs to be mapped.

 

The published figures are indicators that should be carefully evaluated.

 

 

Because it is likely that many individuals and companies do not report the crimes, they are victims of for fear of damaging their e-reputation.

 

Similarly, according to a report published by the Ponemon Institute in March 2012, costs related to data breaches rose from 98 Euros per piece of information stolen or lost in 2010 to 122 Euros in 2011.

 

New regulations, electronic attacks and increasing mobile device usage are forcing companies to be more careful about protecting their data.

 

In the first six months of 2012, it is stated that there was a 24% increase in attacks. 30% of these target companies with less than 250 employees, and large companies with more than 2,500 employees are most targeted.

 

This growth in attacks is a continuation of 2011, when it saw an 81% increase in malicious attacks and a 20

İlginizi Çekebilir

TÜM HABERLER