Story image

BT says investing in all the latest cybersecurity is no silver bullet

29 Aug 2017

It’s dangerous times that we live in as cybercriminal entrepreneurs are becoming increasingly creative in finding and exploiting weak spots.

That’s according to BT, who asserts investing in IT security products alone is no silver bullet in the battle against cybercrime.

In the aftermath of massive global attacks like WannaCry and Petya, BT has published a new cybersecurity whitepaper (The cyber security journey – from denial to opportunity) that warns businesses against falling into dangerous traps as they deal with the complexity of securing a digital enterprise – which includes being stuck in ‘denial’ and ‘worry’ phases at one end of the spectrum, and ‘false confidence’ and ‘hard lessons’ at the other end.

CEO at BT Security, Mark Hughes says the global scale of the recent ransomware attacks shows the astonishing speed at which even the most unsophisticated of attacks can spread around the world.

“Many organisations could have avoided these attacks by maintaining better standards of cyber hygiene and getting the basics right,” says Hughes.

“These global incidents remind us that every business today - from the smallest sole trader through to SMEs and large multinational corporations - needs to get to grips with managing the security of their IT estate, as well as their people and processes. This whitepaper aims to help secure the digital enterprise by navigating businesses through their cyber security journey.”

Perhaps the main finding from the whitepaper is that too often businesses perceive cybersecurity with a one-size-fits-all approach.

BT argues that while investment in technology such as firewalls and antivirus protection is essential ‘good housekeeping’ practice at the start of the security journey, firms should avoid throwing money away on IT security products as a knee-jerk reaction.

This is particularly relevant to companies that have matured from the stage of ‘denial’ and have entered the stage of constant ‘worry’, where investing in the latest technology can be viewed as the magic be-all and end-all solution to the problem.

BT says this common mistake can make firms a target, not just for cyber criminals, but also for over-zealous IT salespeople.

While the paper does acknowledge that security issues are increasingly being discussed at board level, it claims that those discussions are too infrequent and are treated as a separate and disconnected issue from broader operational risk.

Cybersecurity is simply not often perceived as ‘vital’ and therefore not incorporated into overarching business strategies – that is, until they’re attacked.

IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.