Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

One way terrorists have sought to damage their foes is through harming the enemy's economy. Following the 11 September attacks on the Twin Towers, the US economy took a hit. Indeed the horrific attacks and resulting devastation helped push America into recession.

Simply put, Western businesses are at threat from terrorists solely because they contribute to the economies of whatever country they are based in. So corporations and public organisations alike should be at the least a little wary of the intent and technological proficiency of those who mean harm.

There are numerous ways businesses can prepare themselves for terrorist attacks, from business continuity and disaster recovery systems to simple education of employees.

Hypponen said companies should be ready for potentially catastrophic attacks, regardless of whether they are being targeted.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

He pointed to the World Trade Center attacks, noting how some firms lost three-quarters of their workforce. It's a very sensitive issue but one that the corporate world needs to be mindful of nonetheless.

"It was also a very important hub for telecommunication, which created big challenges for companies in the neighbourhood when connectivity was broken," Hypponen said.

"It does affect every single employee. How do you keep yourselves capable of operating even if something disastrous or shocking happens?"

Companies planning to do business abroad are also advised to take care. The Government's UK Trade & Investment (UKTI) body has plenty of warnings about the dangers in each country. From Algeria to Yemen, there is much anti-Western sentiment out there.

For instance, UKTI's advice for businesses heading to Jordan reads thus: "Al Qaeda (AQ) view Jordan as a target because of its moderate and pro-western stance Western interests in Jordan are likely to remain priority targets."

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019