Cyberterrorists: Government Needs To Wake Up And Smell The Coffee

Regarding a report from the UK’s Defence Select Committee that effectively warns the country’s critical national infrastructure is now in jeopardy, owing to a complacent attitude to the threat posed by cybercriminals and cyberterrorists, the solution lies firmly in the government’s hands. The government needs to wake up and smell the (already sour) coffee.

Cybercriminals are – as the name implies – criminals operating in the realm of cyberspace. And likewise with cyberterrorists. They are all professionals at what they do – and they are hell bent on attacking the UK’s digital architecture in order to complete their tasks.

Those tasks range from monetising frauds all the way to inciting and otherwise promulgating terrorist activities against the West. Against this backdrop, the Government needs to act – and act swiftly – in order to seal up what has become a very leaky electronic ship.

The UK has been very lucky to date in avoiding an electronic Pearl Harbour-like situation, as it is clear from the actions of cybercriminals that they now possess the upper hand in terms of technology and resources. The other lucky break is that terrorists have not yet made the necessary investment in technology to allow them to fully utilise the power of cyberspace.

The solution is for the UK to invest in the technology defences to seal any potential loopholes in the security of the critical national infrastructure. This is not about going on the offensive with cybersecurity, as history has proven that going on the offensive is more costly in the longer term than developing an effective defence strategy.

And developing an effective strategy is all about using – and managing – the latest technologies, which include encryption and VPN services, to ensure that the gates to the UK’s critical national infrastructure are as well-policed and guarded as is technically possible.

The irony of this situation – and one that the government appears to have overlooked – is that the technology exists today to make this possible. All that is required is the software to effectively manage the electronic keys to the fortress in the shape of a good EKCM solution.

SHARETweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Pin on PinterestDigg thisShare on RedditShare on TumblrShare on StumbleUponEmail this to someone

A key executive in four successful, high-technology start-ups that have gone public, Jeff Hudson brings over 25 years of experience in information technology and security management. Jeff has spent a significant portion of his career developing and delivering leading edge technology solutions for financial services and other Global 2000 companies. Prior to joining Venafi, Jeff was the CEO of Vhayu Technologies. Vhayu was the market leader for the analysis and capture of market data, and was acquired by ThomsonReuters. Prior to joining Vhayu, Jeff held numerous executive leadership posts, including CEO and cofounder of MS2, Senior Vice President of Corporate Development at Informix Software, CEO of Visioneer, and numerous senior executive posts at NetFRAME Systems and WYSE Technology. He started his career with IBM. Jeff earned a B.A. in communications at the University of California, Davis.