Skip to main content

Cyber Attacks and Related Concerns

We witnessed many cyber attacks on various companies in 2014, but the attack on Sony Pictures Entertainment was the most fatal and the hacker’s identity is not yet confirmed. FBI is blaming North Korean Electronic army because few North Korean IP addresses were traced during the investigation. Sony Pictures were about to release a comedy “The Interview” and the plot is the assassination of North Korean President King-Jo-Un , who is equal to God for North Koreans.

Hackers introduced themselves as ‘Guardians of Peace” GOP, sent a malware “Wiper” in Sony’s computer system infrastructure and deleted entire data from the servers. Hackers took all the official and personal emails and data. The impact was very controversial that Sony’s Co- Chairperson Ms Amy Pascal’s racial mail communications were also published by the hacker and she was fired.

According to Kaspersky main threat comes from external sources as Spam and then from
malware attacks in the form of viruses, worms and Trojans. Priority is always given to protect confidential data because from just one data security attack an average of $80000 is lost. Damages caused by one targeted attack are $2.4 million in an average. When a company’s IT infrastructure is attacked, the amount of data loss from internal operations is calculated as43%, financial data as 22% and client data as31%

Main concerns for a company should be protection of sensitive data, prevention of IT security breaches, mobile device management, unreliability of IT systems, and client management. Obstacles to maintain IT security are heavy expenditure, lack of IT awareness among stakeholders, complexity of IT products and services, lack of support from IT vendors, lack of staff training facilities, co-ordination issues between business administration department and IT department, and access to the corporate network through personal devices like mobile and laptop.

Main strategies companies adopt are installing anti malware protection, software update management, encryption of highly sensitive data, physical security of IT system against theft and calamities, implementation of disaster recovery policy, creating separate IT policy for laptops, pc s and notebooks and regular audits. IT threat is considered as the number one threat for any businesses, than economic instability, and brand reputation. IT threat also includes computer fraud, industrial espionage and intellectual property theft.

Comments

Popular posts from this blog

Saudi Debt Clock Trends: Is a Balanced Budget Ahead?

Saudi Arabia’s Debt Clock: Are Budget Surpluses on the Horizon? Saudi Arabia’s fiscal landscape is evolving — and fast. In this insightful analysis from Talkin Debts , we explore the latest Saudi Debt Clock data and what it reveals about the Kingdom’s bold efforts to balance the national budget in the post-oil-boom era. The country has been navigating a complex equation: πŸ’° Public investment, 🌍 economic diversification, πŸ›’️ oil price volatility, and a growing population. πŸ“Š What You'll Discover in the Full Article: Key Saudi debt trends from 2016 to 2025 The impact of Vision 2030 and non-oil revenue targets Whether the recent surpluses signal a sustainable shift How inflation, bond sales, and reserve strategies are shaping outcomes πŸ‡ΈπŸ‡¦ Why It Matters: As one of the world’s most oil-dependent economies shifts toward diversification, its debt management strategy offers key lessons in balancing growth with fiscal control. This article explains how the K...

Your Personal Debt Clock

Your Debt Clock | Talkin Debts - Track & Manage Your Debt Talkin Debts Personal Debt Clock Track your debt in real-time and plan your path to financial freedom Total Debt Amount ($) Annual Interest Rate (%) Monthly Payment ($) Payment Frequency Monthly Bi-weekly Weekly Start My Debt Clock Overview Amortization Share Payoff Projection Amortization Schedule Share Your Debt Clock Embed this debt c...

Stop Debt Collector Harassment with a Free Cease and Desist Letter Tool

Tired of aggressive calls, letters, or threats from debt collectors? You’re not alone — and you have rights. The Fair Debt Collection Practices Act (FDCPA) gives consumers the legal right to demand debt collectors stop contacting them . But many people don’t know where to start — or how to write a proper cease and desist letter. That’s where the Talkin Debts' Cease and Desist Letter Generator comes in. πŸ›‘ In just a few clicks, this free online tool helps you: Create a legally sound cease and desist letter Customize it based on your situation Assert your FDCPA rights with confidence Take back control from debt collection harassment Whether you want to pause the contact, dispute the debt, or protect your peace — this tool was built for you. ✉️ What You’ll Need: Your name and mailing address Name of the debt collector A few details about the contact (calls, letters, etc.) Then download, print, or email your letter directly to the collector. ...