• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Business Survey Says Cyber Crime Overtakes Physical Crime

    March 20, 2006 Timothy Prickett Morgan

    According to a global survey of over 3,000 IT managers spanning all industries and company sizes commissioned by IBM, cybercrime is becoming more of a big deal for big business than real–what IBM calls physical–crime.

    To publicize the study, IBM released some of the findings among the 600 IT managers who were surveyed in the United States in last January and December. About 60 percent of those polled believe that the cost of lost revenues, loss of current and potential customers, and loss of employee productivity that are the result of hacking, denial of service, and other cybercrimes now exceeds losses from physical crimes like stealing and embezzling.

    Some 84 percent of the executives polled said that they believe cybercrime has moved on from an initial phase where lone or small groups of hackers broke into systems or created malware to a more organized crime structure like that of the underworld we know from television and movies. And 74 percent of those polled on the United States say that the threats to corporate security come from inside–not outside–the organization. The IT managers polled say they want local and federal law enforcement agencies to help them combat this crime, much as they would any other kind.

    “U.S. IT executives are making it very clear how seriously they take cybercrime threat, both from internal and external sources,” explains Stuart McIrvine, director of IBM’s security strategy. “Paralleling their growing awareness of the impact of cybercrime on their business is the view that this is not a battle they can fight wholly on their own. The nature of crime is changing, and businesses, technology providers and law enforcement must work together to ensure the right safeguards are being put in place to securely operate in today’s environment.”

    So what are businesses doing? Upgrading their antivirus and firewall software, for one. Two-thirds of those polled have implemented or are in the process of implementing intrusion detection systems, and half are putting in place automated vulnerability screening and software patch management systems.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 12 -- March 20, 2006

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Two Tricks for Better Printer Control The ARCHIVE Utility

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 12

This Issue Sponsored By

    Table of Contents

    • Network Technology Acquires Twinax, Token Ring Assets from NLynx, Madge
    • Business Survey Says Cyber Crime Overtakes Physical Crime
    • i5 Memory and Disk Prices Need to Come Down
    • Big Blue Lets Big Partners Collaborate with IBM Research
    • Second-Hand iSeries Boxes Are Pretty Cheap
    • Seagull Bolsters SOA Strategy with an Acquisition and a Partnership
    • Microsoft to Lure Competing Business Partners to Windows
    • AttachmateWRQ Expands Market Reach and SOA Technologies
    • COMMON’s Curriculum Is OK; It’s IBM that Needs to Change
    • Azul Systems Sues Sun Over Java Licensing

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • The Cloud’s Future Is So Bright, So Why Are You So Glum?
    • Most App Modernization Projects a Struggle, Survey Finds
    • COMMON Launches IBM i Security Conference
    • Four Hundred Monitor, August 17
    • A Slew Of Add-On Services For Power10 Systems
    • Power10 Midrange Machine: The Power E1050
    • IBM Puts The Finishing Touches On PowerHA For IBM i 7.5
    • Guru: Regular Expressions, Part 2
    • Get Your Security Education, And Not From The School Of Hard Knocks
    • IBM i PTF Guide, Volume 24, Number 33

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2022 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.