2014: the year that security broke

Davey Winder takes a look back at how insecure we all were in 2014...

Yes, I'm talking Sony Pictures Entertainment and the breach that led not only to gigabytes of data in the form of emails, documents and unreleased movies being stolen, but also to a shocking display of corporate capitulation.

Sony, when threatened by what is believed to be terrorists, withdrew the film apparently at the heart of the hacking raid. That film will likely now never be seen, nor will the days when cyber attackers took the money (well, data) and ran.

Already there has another attack, this time on a South Korean nuclear power plant, where the attackers have demanded reactors are closed or system specification documents will be released into the public domain. This story was breaking as I wrote this article, so the precise security implications of the stolen documents and the South Korean response is - as yet to me - unconfirmed. The fact that political blackmail has firmly entered the breach equation though does mean that all enterprises will have to double their security efforts in 2015.

I said at the start of this look back that there was little positive to be plucked from the insecurity cluster-bomb that was 2014 but, looking forwards, I think there probably was one rather large bit of collateral repair as it were: publicity.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

This was the year that cyber security stories reached the mainstream media outlets with a vengeance. Indeed, at the annual BT Information Security Journalism awards ceremony, the overall title (which I myself have won three times in the past) went to BBC correspondent Gordon Corera for his various reports on the subject.

This has to be a good thing, because when these stories find their way out of the technology sector silo and into the psyche of the general public it means awareness of the threat increases. And, after all, awareness is pretty much the only weapon we have left to fight the continuing onslaught.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Most Popular

Visit/cloud/cloud-computing/354767/google-cloud-snaps-up-multi-cloud-analytics-platform-for-26bn
cloud computing

Google Cloud snaps up multi-cloud analytics platform for $2.6bn

13 Feb 2020
Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020