From Drone Hackers to Cyber Bodyguards, China Cyber Security a Growing Concern

Login to View

China Money Network

UNLOCK DATA
Subscribe & Access the Best Data and Intelligence on Chinese Venture Capital and Tech


Read 2 Articles for Free with a Basic Account

Gain limited and restricted access to China Money Network.

Register Basic Account

Subscribe for an annual subscription!

Enjoy comprehensive and exclusive data you can't find elsewhere!

More Info


Subscribe and Pay Easily Online!

Already have an account or paid subscription? Log in


RELATED NEWS



1 COMMENT

  1. Over 90% of hacking is conducted through phishing…." according to the above article, in regards to attacks against Chinese targets. The article continues….

    "[if] 30% of your 9000 staff were to click, that’s 3000 cases of malware potentially downloaded into your systems.But after phishing training, finishing the exercises, the number was reduced to 5%." Well guess what? That drop from 30% to 5% means absolutely nothing in terms of improvement.

    It takes but one single user to click on a phishing email to load the malicious script.

    But lets get real here folks. China is the world’s #1 cyber-espionage, CNA, CNE attacker with immunity…once China has stolen everything there is to steal [aided by Western inaction and wimpy responses] than Cyber-crime will stop.

    If you would rather keep YOUR IP and knowledge based capital safe from these Chinese APT’s check out http://www.redteamcybersecurity.ca

    I also found that the problems were caused by the way companies backed up their data. In the old days, companies backed up their systems to separate drives, which built up over time, like a time stamped library; these were known as cold back-ups. If a company was infected, once we identified the specific date the infection took place, at least we knew that any data backed-up prior to that would be free of that attack. Nowadays, we find that companies use ‘hot back-ups’ where the data is backed-up on a rolling basis, often to the cloud. It is far more challenging to solve the problem when the infection is automatically copied to the backup.

    Q: Last December, Intel issued a report saying drone hacking may be the latest cyber threat. This is a big deal for companies like JD.com, that plan to do much of their business using drones. What do you think Chinese companies should do to defend such attacks?

    A: What they should do is the same as other innovative companies developing valuable IP. The most important thing, in my opinion, is for those companies to have the mindset of having cybersecurity as an essential part of their overall strategy, rather than considering as just an expense they wo