Russian military operations targeting Ukrainian energy facilities amid ongoing conflict - Global Banking & Finance Review
The image illustrates the aftermath of Russian attacks on Ukrainian energy infrastructure, crucial to Kyiv's military capabilities. This highlights the intensifying conflict and its implications for global finance and security.
Technology

WEATHERING THE CYBER STORM

Published by Gbaf News

Posted on February 19, 2014

5 min read

· Last updated: February 11, 2019

Add as preferred source on Google

By Sean Newman, Security Evangelist, Sourcefire now part of Cisco

Remote Work Challenges Amid Severe Weather

With huge storms battering Britain in recent weeks, resulting in trains being cancelled and roads flooded, it is inevitable more people will have chosen to work from home. Gale force winds and torrential rain not only cause major disruption to the commuter, but potentially your company’s IT network by increasing the risk of a cyber attack.

Sean Newman, Security Evangelist, Sourcefire now part of Cisco

Sean Newman, Security Evangelist, Sourcefire now part of Cisco

Cyber Risks of Increased Home Working

The threat of intrusion cannot be underestimated, with hackers looking at every way possible to infiltrate your system including mobile devices such as laptops, tablets and smart phones. The huge shift to these devices, combined with bring your own device (BYOD), in the workplace is further aggravating the risk, with TechMarketView predicting 9.5 million employees in the UK alone are expected to adopt BYOD by 2016 – an 80 per cent rise on 2011. Additionally, US authorities reported last year that 79 per cent of mobile attacks in 2012 occurred on Google’s Android operating system, while the number of malicious Android apps topped one million in October.

Common Mistakes and User Vulnerabilities

A more recent study by Sourcefire shows many of us still click on web-links without checking if they are genuine, and it has been suggested that this is often wrongly perceived as just a PC problem rather than via mobile devices.

Of course, there are real benefits to BYOD and it would be incongruous and impractical to advocate a ban in the workplace, but organisations need to be prepared for a cyber attack. It is in the interests of any organisation to be vigilant with any attack impacting productivity due to slow connection speeds and performance, faster battery drainage and call drop-outs.

Effective BYOD Policies for Protection

Businesses should consider how, not if, they will be attacked, by understanding how mobile devices are used and what data they are carrying and produce a BYOD policy to define proper usage. During any breach, it is important organisations can quickly identify infected devices and monitor the attack, and how it poses a risk to them and threatens their devices. Should a business be compromised, a retrospective analysis should be undertaken to ensure effective containment and remediation of the affected systems and measures taken to ensure better prevention in the future.

Implementing Preventative Security Measures

Just like the miserable, wet and windy February weather, if you go out without your coat, boots or umbrella you are going to get soaked and take much longer to dry out. By taking a few preventative steps you might still get a bit wet, but nothing that is going to leave you drowning in the flood.

By Sean Newman, Security Evangelist, Sourcefire now part of Cisco

With huge storms battering Britain in recent weeks, resulting in trains being cancelled and roads flooded, it is inevitable more people will have chosen to work from home. Gale force winds and torrential rain not only cause major disruption to the commuter, but potentially your company’s IT network by increasing the risk of a cyber attack.

Sean Newman, Security Evangelist, Sourcefire now part of Cisco

Sean Newman, Security Evangelist, Sourcefire now part of Cisco

The threat of intrusion cannot be underestimated, with hackers looking at every way possible to infiltrate your system including mobile devices such as laptops, tablets and smart phones. The huge shift to these devices, combined with bring your own device (BYOD), in the workplace is further aggravating the risk, with TechMarketView predicting 9.5 million employees in the UK alone are expected to adopt BYOD by 2016 – an 80 per cent rise on 2011. Additionally, US authorities reported last year that 79 per cent of mobile attacks in 2012 occurred on Google’s Android operating system, while the number of malicious Android apps topped one million in October.

A more recent study by Sourcefire shows many of us still click on web-links without checking if they are genuine, and it has been suggested that this is often wrongly perceived as just a PC problem rather than via mobile devices.

Of course, there are real benefits to BYOD and it would be incongruous and impractical to advocate a ban in the workplace, but organisations need to be prepared for a cyber attack. It is in the interests of any organisation to be vigilant with any attack impacting productivity due to slow connection speeds and performance, faster battery drainage and call drop-outs.

Businesses should consider how, not if, they will be attacked, by understanding how mobile devices are used and what data they are carrying and produce a BYOD policy to define proper usage. During any breach, it is important organisations can quickly identify infected devices and monitor the attack, and how it poses a risk to them and threatens their devices. Should a business be compromised, a retrospective analysis should be undertaken to ensure effective containment and remediation of the affected systems and measures taken to ensure better prevention in the future.

Just like the miserable, wet and windy February weather, if you go out without your coat, boots or umbrella you are going to get soaked and take much longer to dry out. By taking a few preventative steps you might still get a bit wet, but nothing that is going to leave you drowning in the flood.

Key Takeaways

  • Severe weather in the UK has forced more people to work remotely, increasing attacker exposure via home and mobile networks.
  • The widespread adoption of BYOD amplifies risks, with mobile platforms—especially Android—being key malware targets.
  • Organisations must shift mindset to assume attacks will happen, enforce BYOD policies, and prepare incident response and remediation plans.

References

Frequently Asked Questions

Why do storms increase cyber risk?
Severe weather drives remote work, expanding the attack surface via home networks and personal devices often less secure than corporate systems.
Why is Android a major concern for mobile malware?
In 2012, Android accounted for about 79–95% of mobile malware incidents, largely because of its open architecture and widespread use across BYOD devices ([phonearena.com](https://www.phonearena.com/news/Uncle-Sam-79-of-malware-was-sent-to-Android-in-2012_id46773?utm_source=openai)).
What should organisations do to mitigate BYOD risks?
They should adopt BYOD policies defining usage, monitor and rapidly isolate compromised devices during breaches, and conduct post-incident analysis to strengthen defences.

Tags

Related Articles

More from Technology

Explore more articles in the Technology category