In today’s technological world, as we move to the “Internet of Things” nearly everything is connected to the web. We’ve recently heard a lot about the Chinese company Huawei and the risk their technology poses to other nations infrastructure. But the Chinese are not alone. Russia (and former Soviets nations), North Korea, Iraq and Iran are all state players. Terrorists and criminals hide in the anonymity offered by VPNs, proxies and the dark web, to conduct cyber theft, phishing and ransomware attacks. Meanwhile criminals continue in traditional ways, enhanced by technology, to clone remote keys to steal cars or skim credit cards, physically or using contactless technology; and act with bravado to openly enter secure buildings to gain access to paper based secrets or high value goods.
Individuals and organisations need to be aware of the threats, the attack vectors and what to do minimise risk of theft or exposure. The only way of knowing what you are faced with is to conduct targeted assessments. These can be:
They can be one off or combined with training and conducted on a recurring basis, to give reassurance that the threats you face are being successfully mitigated.