Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Enterprise I.T.
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
Enterprise Lessons from Anonymous' World Cup Threat

Enterprise Lessons from Anonymous' World Cup Threat
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Anonymous is taking on the World Cup, threatening to launch cyberattacks on its sponsors. To deal with Anonymous' threats, World Cup sponsors and all businesses need to take a gaming frame of mind when they build their cybersecurity practices -- it's about the game play, not the technology, said TK Keanini, CTO of network security firm Lancope.
 


Anonymous isn’t making as many news headlines this year as it did in years past, but the hactivist organization is alive and well -- and making threats to launch cyberattacks on sponsors of the World Cup in Brazil.

“We have a plan of attack,” a member of Anonymous who calls himself Che Commodore, told Reuters. “We have already conducted late-night tests to see which of the sites are more vulnerable . . . This time we are targeting the sponsors of the World Cup.”

Reuters admits it had no means of confirming Commodore’s identity or his affiliation with Anonymous and reports that the sponsors did not immediately respond to requests to comment on the threat. But what can enterprises learn from this global headline?

Are You Ready?

We caught up with TK Keanini, CTO of network security firm Lancope, to get his take on the Anonymous moves. Regardless of threat profile, he told us an event of this magnitude needs to have a heightened level of readiness to a physical or cybersecurity related event.

“By the time a group like this makes a public announcement, much of the infiltration phase has already been done,” Keanini said. “These threat actors are smart and they don't start to show their cards until they are well into the operational phase of their campaign.”

Keanini stressed that events like the World Cup require hundreds of interconnected businesses all of them need to be prepared. Offering the hard truth, he said if your business is connected to the Internet you should be prepared for cybersecurity events because they are likely to have already happened -- you just don't have the tools and techniques to detect them.

“When we consider the World Cup and the level of talent competing, it helps us frame the challenges many face in cybersecurity,” Keanini said. “It is not as much about the technology, as it is about the game play and talent where as soon as one side makes a mistake, it is exploited by the other team.”

A Gaming Frame of Mind

This is the same thing that happens in cybersecurity and in some cases, he said, the adversaries have an overwhelming advantage in terms of talent. His advice: businesses need to take a gaming frame of mind when they build their cybersecurity practices -- it is about the game play, not the technology.

We also asked Tom Cross, Lancope director of security research, for his take on the Anonymous news. He told us distributed denial-of-service attacks often come into play in public controversies and protests. At this point, he noted, preparation for denial-of-service attacks should be standard practice for any organization with a large, mission-critical presence on the Web.

“However, every organization with an Internet network can do their part to make sure that they don't have services running on their network that can be leveraged by attackers for traffic reflection and amplification,” Cross said. “DNS servers, NTP servers, SNMP services, voice over IP services and XML-RPC ping back services in particular should be checked to make sure that they don't provide a spring board for denial-of-service attacks.”
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Enterprise I.T.
1.   Target Data Breach Cost: $148 Million
2.   Data Stolen from U.S. Health Network
3.   Cisco Axes 6,000 Employees
4.   Are Robots Poised To Steal Our Jobs?
5.   NSA Brings German Encryption Boom


advertisement
Target Data Breach Cost: $148 Million
Better customer data protection needed.
Average Rating:
Data Stolen from U.S. Health Network
Chinese hackers targeted hospital firm.
Average Rating:
Cisco Axes 6,000 Employees
Company is facing declining profits.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 

Enterprise Hardware Spotlight
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 

Mobile Technology Spotlight
Apple Stock Soars Ahead of iPhone 6 Launch
The imminent release of the iPhone 6 -- and maybe even an iWatch -- has sent Apple's stock soaring to new heights. Considering what else the firm could have up its sleeve -- the stratosphere may be the limit.
 
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.