Tuesday, June 14, 2011

Hacking and Security Breaches: A Growing Problem, and A Growing Opportunity - Trending Now...

Share this ARTICLE with your colleagues on LinkedIn .





Businesses (large and small), government agencies, financial institutions, healthcare providers and even computer security firms are being hacked. Their data (some of which invariably relates to you as a business, an individual, a consumer, and a person with certain affinities, closeted skeletons, health issues and legal or financial problems) cannot be regarded as secure.

The more highly dependent we become on mobile messaging, cyberspace data storage, zip drives, e-commerce and automatic bill payment via computer, the more vulnerable we become.

By hacking, I mean every type of informationa intrusion from social engineering (i.e., where a rogue employee at an insurance or other firm steals data and sells it), to credit card skimming, illicit GPA tracking, downloading of viruses, tracerware (keystroke loggers and the like, as well as GPS "locators"), phishing, trojan horses designed to take over some aspect of an electronic device's functioning, signal interception, secret duplication and re-routing of confidential data, brute force password decryption, hijacking of network connections, turning computers and mobile phones into transmitters of information to third parties, and just the ability to launch a robotic assault against a website or application. Various highly connective social media platforms and applications are helping to ease access to would-be abusers. Apple and Mac users have increased in numbers and percentages, and sure enough, the hackers are finding new opportunities to infiltrate these systems as they have done for years with PCs.

Hackers tend to emulate the viruses and worms that they create. They are very clever, very dangerous, capable of mutation and adaptation, and very good at disguising their presence from the host or victim.

The opportunities for hackers to access and utilize valuable information are increasing with our informational and communications habits -- so too are the opportunities for firms which are developing privacy safeguards, back-ups, firewalls, intrusion detectors, employee access controls, multi-layer security sytems, super-secured storage and security audit programs and assessment systems.

These latter parties will find giant and ever-expanding markets in both the private and public sectors, in organizations of all sizes and industries, and even for each other. Feeding on this insecurity-fueled market and concerned- investor environment (on both Main Street and Wall Street), venture capitalists and accredited angel investors will be increasing their interest in companies that are developing these countermeasure technologies.

With the recent hacking of Citigroup, the IMF, and a number of healthcare firms and record retention and storage facilities, informational security is becoming a recurring front-page news theme.

An example follows:

Is it safe for you to bank online?


The recent Citibank hacking shows why you need to take these precautions. Easiest way crooks can get into your PC

Related links

####

Informational security, data recovery, employee "watchware" and other fields are evolving at an accelerating pace, lagging slightly behind the development of new invasion and intrusion techniques and technology by the "black hats." Not surprisingly, many of these "black hats" are the ultimate opportunists -- they create a problem, and then sell an antidote to the disease which they themselves have created.

There will be some wonderful investment opportunities throughout the Global Economy in some early-stage ventures which show some promise in terms of developing scalable, customizable defenses and antidotes.

Faithfully,

Douglas E Castle, Chairman, TNNWC Group, LLC

Note: This article, in variations, was originally published in THE GLOBAL FUTURIST, THE NATIONAL NETWORKER (TNNWC) SUPPLEMENTAL RSS FEED, REASON OUT OF RANDOMNESS, and ENTREPRENEURIAL ADVICE AND INSIGHTS. In Reason Out Of Randomness, the article was titled "Hacking And Information Theft - No Business Or Organization Is Immune."

Tags, Labels, Keywords, Terms, Categories For This Article:
Related articles

---------------
NOTICE: This article is Copyright © 2011 by author Douglas E Castle with all rights reserved. It may be republished without permission provided that it is published in full, with all hyperlinks and exhibits left intact, and with full attribution given the author. This article does not contain or constitute medical, health, psychological, legal, regulatory, investment, securities, financial, tax, or any other form of professional advice -- the reader acknowledges and accepts this disclaimer. Further, the reader indemnifies and holds harmless both the author and all publications in which this article appears of any damages, claims, loss, responsibility or liability emerging from the reader’s utilization of any information contained herein.


About This Author: Further information regarding this author’s professional experience, expertise and service offerings can be found at ABOUT DOUGLAS E CASTLE

Other Blogs And RSS Feeds By This Author: A comprehensive list of blogs and RSS feeds on various subjects written or moderated by Douglas E Castle may be found by clicking on the orange icon below.

This Blog Is Powered By TNNWC Group, LLC ™

Contact This Author Directly: Click HERE for an instant pop-up form.

You may follow Douglas E Castle on TWITTER 

The author highly recommends that each of his respected readers becomes Pinglerized (a Lingovation™) in order to maximize SEO, search engine ranking, and to exponentially increase both unique visitors and recurring traffic to your website or blog. Leverage this wonderful technology.



The author wishes to thank the following resource providers:

Feedburner, CoolText Graphics, JavaScript Free Code, Zemanta, Google, WordPress, Widgetbox, and Wikipedia
---------------

No comments:

Post a Comment

Blog Archive

Bookmark and Share