2014: the year that security broke

Davey Winder takes a look back at how insecure we all were in 2014...

Yes, I'm talking Sony Pictures Entertainment and the breach that led not only to gigabytes of data in the form of emails, documents and unreleased movies being stolen, but also to a shocking display of corporate capitulation.

Sony, when threatened by what is believed to be terrorists, withdrew the film apparently at the heart of the hacking raid. That film will likely now never be seen, nor will the days when cyber attackers took the money (well, data) and ran.

Already there has another attack, this time on a South Korean nuclear power plant, where the attackers have demanded reactors are closed or system specification documents will be released into the public domain. This story was breaking as I wrote this article, so the precise security implications of the stolen documents and the South Korean response is - as yet to me - unconfirmed. The fact that political blackmail has firmly entered the breach equation though does mean that all enterprises will have to double their security efforts in 2015.

I said at the start of this look back that there was little positive to be plucked from the insecurity cluster-bomb that was 2014 but, looking forwards, I think there probably was one rather large bit of collateral repair as it were: publicity.

Advertisement
Advertisement - Article continues below

This was the year that cyber security stories reached the mainstream media outlets with a vengeance. Indeed, at the annual BT Information Security Journalism awards ceremony, the overall title (which I myself have won three times in the past) went to BBC correspondent Gordon Corera for his various reports on the subject.

This has to be a good thing, because when these stories find their way out of the technology sector silo and into the psyche of the general public it means awareness of the threat increases. And, after all, awareness is pretty much the only weapon we have left to fight the continuing onslaught.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019