Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

GFI Doubts Effectiveness Of Increased Cyber Vigilance Without Fundamental Changes in Approach

GFI Software : 19 October, 2010  (Technical Article)
Procedural changes required in dealing with national cyber-crime in order to be effective, warns GFI
Increased warnings in relation to 'cyber terror' ahead of a spending review sounds like a move to secure funding and avoid cuts - the UK Government warns this is a grave threat, yet continues to use Internet Explorer 6, a browser that has been largely discredited due to its numerous security flaws!

Until recently, you couldn't even report computer crime to the National Hi-Tech Crime Unit (NHCTU) - you had to go to a local police station and hope the officer at the desk knew what you were talking about and escalated your report to the right department.

As a country, we have struggled to deal with modest, home-grown threats effectively − such as those posed by script kiddies − so what chance do we have against professional computer criminals with our current grass roots law enforcement, intelligence and counter terrorism capabilities and initiatives?

In order to effectively respond to growing cyber security threats - regardless of whether they are perceived or proven threats - it is essential to invest in proven technologies to identify and repel external data threats, as well as invest in people with the knowledge and expertise to anticipate and identify threats, and take appropriate action to secure key infrastructure, core networks and devices at either a national or local level.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo