Education and normalisation is the key to tackling the cyber threat Part 1

25 Apr 2016

Education and normalisation is the key to tackling...

By  Matthew Olney  – Communications and Content Executive at PGI (This article was first published in the New Statesman)

On New Year’s Eve 2015, the BBC website was knocked offline. Immediately social media was abuzz with rumours and it wasn’t long before the press got involved. Headlines blamed the so called Islamic State for the attack. In reality, it turned out to be the handiwork of anti IS hacktivists who were testing their capabilities.  Either way, the question remains whether a simple piece of temporary on-line vandalism merited the media profile it generated.

People Fear What They Do Not Understand

Cyber is a word that can cause the mind to race.  A “Cyber-attack” is as dramatic as whatever an imagination makes it.  With the right stimulation, “Cyber-attacks” make good headlines and great scare stories. The best way to tackle the threat posed by cyber criminals is to educate people so that they understand how such attacks occur and in turn learn how to counter them. If we regard cyber crime in a similar context to say burglary, then immediately the threat is normalised.

Every decision we make in our lives - be it conscious or sub-conscious; is based upon some kind of risk assessment.  Unless an understanding of the “new Cyber threat” is thorough and widespread, the associated risk will continue to be seen and treated as extraordinary.  In the 21st Century, where technology underpins just about every we do and use, this is an unsustainable and unaffordable position.

In business and government worlds this lack of understanding continues to be relentlessly exploited by an IT Security industry who perpetuate the concept of dramatic and increasingly apocalyptic consequences if their new security technology is not adopted.  The Industry continues to use the same hi-tech, complicated scare language that they adopted in the run-up to the millennium that burned its credibility and confidence in its integrity. 

The real world consequence of this lack of understanding and consumer scepticism is that the take-up of Cyber Security risk management is far slower than it should be. Perhaps, unlike Y2K, there are genuine threats and risks which are, and will continue to be, an inherent and perpetual aspect of adoption of technology.  There are always people who will seek to exploit good things for nefarious or criminal means, and technology is no different.   But that doesn’t undervalue the huge benefits of adopting technology.  Nor does it mean – just like all other security risks - that the threat is anything to disproportionately fear.

For years, law enforcement agencies have educated the public on how to protect their property from would-be thieves and just like conventional crime, there are measures that people and organisations can take to prevent themselves from becoming victims of a cybercrime.

The risks are hugely different depending upon the environment in which they are considered and, again, just like other security risks, proportionate treatment of them for the vast majority, need not be expensive, complicated or anything other than a normal cost of living and operating in the 21st Century.   Even those, such as Banks, Defence Industry, some Government Departments and other industries, where the nature of the threat is more complex and higher-impact. Effective risk management need not be any more challenging.

 For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

Read part two  here  and part three  here 

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP