Cyber security one of top 5 world risks

SECURITY

|
Image: By BiztechAfrica
Cyber security one of top 5 world risks

The World Economic Forum meeting in Davos has identified cyber security as one of the top five risks in the world, but experts have cautioned against restricting the internet as a result.

Delegates at the conference heard that a new piece of malicious software is introduced every 30 seconds.

Over 2 million viruses, worms, back doors or Trojans have emerged over the past two years, and the threats are constantly growing. People used to hack computers for notoriety, and then as a criminal activity. Today, companies and nation-states are also behind cyber attacks, in the form of industrial and military espionage, respectively.

Attribution is a fundamental issue in addressing the problem, experts said. The biggest challenge is identifying who is behind a cyber attack and from where it comes, since cyber criminals are anonymous and operate without boundaries.

Experts noted that more international cooperation is needed to investigate cyber attacks and try to solve the attribution problem. With 4.5 billion users around the world, a sophisticated international framework may be one way to address the issue.

Rod A. Beckstrom, President and Chief Executive Officer, Internet Corporation for Assigned Names and Numbers (ICANN), USA, said: “Everything attached to a network can be hacked and everything is being attached to a network.”

Collaboration is the key to addressing the ongoing arms race between cybercriminals and the corporations, lawmakers and governments who oppose them, Beckstrom said.

Neelie Kroes, Vice-President and Commissioner for the Digital Agenda, European Commission, Brussels, described her belief that the future economy is inherently coupled to the Internet, so much so that cyber risk should be added to standard corporate reporting.

However, the COO of social networking site Facebook, Sheryl Sandberg, was one of those who noted that while security was paramount, there was still a need for a free and open internet platform. She said the internet and the social media had emerged as a major platform for freedom of speech.

Outlined at the event, a Partnership for Cyber Resilience highlighted key principles for cyber resilience, which were developed by Deloitte through multistakeholder dialogue across multiple regions and sectors.

In summary, the Principles are:

-Recognition of interdependence: All parties have a role in fostering a resilient shared digital space

-Role of leadership: Ensure executive-level awareness and leadership of cyber risk management

-Integrated risk management: Develop a practical and effective implementation programme

-Promote uptake: Where appropriate, encourage suppliers and customers to develop a similar level of awareness and commitment



Share the News

Get Daily Newsletter

comments powered by Disqus

MORE SECURITY NEWS

Ransomware: don’t pay the cybercriminals

ESET offers tips on how keep PCs protected and avoid supporting cybercrime activities. Read More

Data breaches to cost $2.1 trillion by 2019

New research suggests that the rapid digitisation of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. Read More

Betting the farm on untested tech

While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it. Read More

Mobile student ID system to authenticate over 2 million Nigerian students

HID Global and Botosoft have built and delivered a system to help the West African Examinations Council (WAEC) register and authenticate Nigerian students. Read More

‘WD purple surveillance drives tackle security challenges’

Western Digital has released one of its flagship products, purple surveillance storage drives (WD Purple), in Nigeria, saying the solution, designed for high definition (HD) surveillance, will help tackle insecurity. Read More

Malawi Veep to lead in cyber security meeting

Malawi’s Vice President Saulos Chilima will next week preside over a sensitisation workshop on Cyber Security organised by the Malawi Communications Regulatory Authority (Macra) in collaboration with the Common Market for Eastern and Southern Africa (Comesa). Read More

Fighting the insider threat

There has been a growing focus on the threats posed by company employees who have access to critical information and either maliciously or carelessly leak that data, says Phoenix Software. Read More

Zambia to host Southern African Banking and ICT Summit 2015

Efforts to curb increased incidences of cyber crime within Africa’s financial institutions, Government Agencies and private sector have received a boost with the planned Southern Africa Banking and ICT Summit set for April, 30th , 2015 at Intercontinental Hotel Lusaka Zambia. Read More

E-PPAN alerts bank customers on fraudsters

With many bank customers that use the electronic payments falling prey to fraudsters, Electronic Payments Providers Association of Nigeria (E-PPAN) has warned customers to be wary of how they release the details of their bank accounts to people. Read More

TESPOK, Kenyan government monitoring cybercrime

The Telecommunications Service Providers Association of Kenya (TESPOK) and the government are monitoring and collecting data on cybercrime on the country’s networks in a bid to tackle the growing problem. Read More

PRESS OFFICES

Sage ERP AfricaSAP AfricaSage Pastel AccountingTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4Afrika

FEATURED STORY

The transformative power of affordable smartphones and unlimited data in GhanaThe transformative power of affordable smartphones and unlimited data in Ghana

Smartphones are helping transform their lives of ordinary people in Ghana, Reports Nana Appiah Acquaye.

IN DEPTH

NIMC infrastructure must be managed by credible people: NIMC chiefNIMC infrastructure must be managed by credible people: NIMC chief

NIMC’s chief speaks to Kokumo Goodie about the role of the NIMC and his own legacy.