‘Cyber Security Awareness month’ comes to a close, but don’t let your M2M guard down

According to a report from the United States Government Accountability Office, The U.S. Computer Emergency Readiness Team reported a 782% increase in cyber incidents from 2006-2012. As this number increases cyber security companies are coming under pressure to create products and tools that not only defend against potential threats, but also assist recovery where an incident occurs.

Cyber security companies exist to mitigate the risk of a cyber breach and mitigate the harm that one could cause, says Jeremy Cowan.  If you’re not in that industry you may not have known it, but October is now also known as Cyber Security Awareness month (I wasn’t aware of that, and for once this is a month that hasn’t been re-designated by the greetings card industry.)

This is a serious subject though, and becoming ever more so as cyber security breaches can happen to anyone at anytime. It could be you that suffers, or your family, your doctor, your college, the stores you shop in, the websites you visit, and even the utilities and agencies that meet basic needs like water and electricity.

The infographic below depicts some of the most infamous occurrences over the last decade and how they’ve affected the global cyber landscape. Thank you to SRC Cyber of New York who sent us the infographic below to show what can be done; besides promoting SRC it contains some interesting data so we thought we’d share it with you. Other cyber security protection companies are of course available, and M2M Now will continue to keep a watch on how this industry as a whole is protecting the Internet of Things and users of connected devices.

1 2014 Cost of Data Breach Study: Global Analysis, Benchmark research sponsored by IBM, conducted by Ponemon Institute LLC, May 2014
2 The “No Network is 100% Secure” series – The Aurora Power Grid Vulnerability – A White Paper, Easyrider LAN Pro, Mar. 2009
3 “June Hack of Washington Post Netted 1.27M User Account Details,” Damon Poeter, PC Magazine, July 2011
4 “Target’s Data Breach Gets Worse,” Sarah Perez, Tech Crunch, Jan. 2014

Recent Articles

MVNO claims world’s first as 5G eSIM service goes live

Posted on: July 7, 2020

“Virtual SIM card plan is instantly connecting users to the world’s mobile network in select countries worldwide.”

Read more

New area of wireless communication in industrial automation

Posted on: July 7, 2020

Since the mid-1990s, industrial communication technologies have been increasingly oriented towards mainstream technologies. These mainstream solutions – in part adapted – have been incorporated into the automation tasks of the manufacturing industry. Examples of this include Ethernet and WLAN technology, but also the industrial PC, says Alexander Bufalino, VP marketing, Quectel Wireless Solutions Co.,Ltd.

Read more