Hacking has recently re-emerged as a buzzword. With our increasing adoption of smart technology systems, whole cities are become more susceptible to cyber-attacks.
As Hackers become more innovative, greater security solutions are required to keep networks safe and secure. System 5 creates custom scalable security solutions for SME’s such that their business assets are secure.
Hackers that made Headlines
Crazy Cat Cyber Criminal
A Japanese hacker believed to be responsible for sending multiple death-threats to places such as schools and conferences sent police on a wild-cat chase. Law enforcement was first tasked with solving a series of riddles and then directed to locate a very specific cat living on an island. When the feline was finally found, they retrieved a memory card that was attached to the animal’s collar. On the card were messages meant for the police that attempted to explain the hacker’s motives – but in turn served to help officials locate and arrest the culprit.
A hacker working under the name “Guccifer” hacked into George W. Bush’s AOL account and stole a host of personal information. The content that grabbed the most headlines (and our imaginations) was a series of bizarre bathroom self-portraits painted by the former U.S. president. Including one painting that had ‘W’ in the bathtub looking at his toes! The art provided a unique, if somewhat awkward, perspective of a renowned public figure. “Guccifer” was eventually found and sentenced to four years jail time for his deeds.
Election ‘Disruption’ in Politics
French candidate Emmanuel Macron suffered a massive hack on the eve of the French Election in May 2017. The hackers released tons of documents, emails, and accounting records. In a calculating move, the hackers not only dumped real documents but also threw in a bunch of false documents make it difficult to sort through & validate – to further confusion, suspicion and delays in clarification. Timing was crucial in this case as the hackers acted right before a new law that would limit campaign communication came into effect. Their acts were such that Macron wasn’t left with enough time to defend against any allegations before the popular vote was cast.
Hackers have gone beyond dumping digital data, threatening safe online payment, and holding files and systems ransom. They’ve made the move into real-world damage that carries a massive impact on ordinary people who may not even be using a computer! The first time a hacker hit Ukraine’s power grid was in 2015 when two days before Christmas hackers cut electricity for a quarter of a million citizens. The hackers hit again and harder almost one year later to the day. This time they literally turned off a cities power supply! Imagine hospitals, police stations, and traffic lights an entire major city without electricity across the grid! Regardless of the inconveniences of such a black-out, turning off the electricity in the middle of a brutal winter brought a host of additional risks. Without working water pumps, city pipes froze and broke thus threatening water supply. Without heat-generators, in 0F/-17C, the lives of the young and elderly were put at risk.
This massive attack has shifted expert’s thoughts from ‘what-if’ talk and turned it into a ‘what-now’ conversation. The ongoing ‘cyber-war’ within Ukraine has caused governments and municipalities re-think and strategize on how they will defend their infrastructure systems and their citizens against new dangers born in cyber space.
How Secure is your System?
Cyber criminals don’t discriminate! How secure is your business? System 5 offers this free-to-use Q&A form to businesses such that clarity can be gained. Additionally, System 5 offers free on-site IT System Evaluations such that SME’s can determine how to better use their existing IT Infrastructure and which features could be strengthened. If you wish to see which IT Services are offered to SME’s, click here to see the competitive edge.
In furthering the success of businesses, we implore you to share the following article with your staff – it is a simple guide for employees such that they avoid Ransomware.