This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Print page

No such thing as hacker-proof

You’ve been breached, or soon will be. Now what?

Download No such thing as hacker-proof chapter

Selcted chapters to download Download chapter         Watch our video Video        Back to Tech Trends 2013 homepage

Many organisations may have a false sense of security, perhaps even complacency, resulting from their investments in non-agile security tools and processes they have relied on for years. Yet firewalls, antivirus, intrusion detection systems (IDS) and intrusion prevention systems (IPS) are increasingly less effective as attackers leverage encryption and other innovative techniques to evade them. Many companies are failing to detect long-dwell cybercrimes in their IT environments and misallocating limited resources to lesser, more generic threats. Basic security blocking and tackling is valuable, but is in no way sufficient.

No such thing as hacker-proof

Organisations across many industries need to improve their response. That can require changing the lens through which they view cyber risk - not relying upon traditional security controls revealing tell-tale signs of an effective attack - but using intelligence and advanced techniques to identify the coming threat and proactively respond.  

Key contact

  • Kevin Walsh
    Partner and Practice Leader,
    Technology Consulting.

Related insights

P@$$1234: The end of strong password-only security P@$$1234: The end of strong password-only security
The end of strong password – only security.
   
Blurring the lines: Information security in a world without boundaries Blurring the lines: Information security in a world without boundaries
Global survey examining information security practices and trends across Technology, Media, and Telecommunications.
   
Cyber Security. Evolved. Cyber Security. Evolved.
Experience the speed and intensity of a cyber attack, in less than 300 seconds.

.

Related links

  • Back to Technology trends homepage
  • Tech Trends 2013 at a glance
  • Watch all videos
  • Technology Services
  • Learn more
  • CW500: Five technology forces that will change business forever
  • Digital app developer skills take centre stage in corporate IT
  • CW500: Skills shortage loom as development comes back in-house

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options
Follow:

Get in touch

More on Deloitte