Can This Company Recover From a Cyberattack?

23 Aug

A case study we’ve just published explains the challenges faced by Peter Justen, chief executive of MyBizHomepage, a Middleburg, Va., provider of business accounting software. The business was shut down by a wave of cyber attacks that apparently came from a disgruntled former employee.

Mr. Justen founded the company in 2006 to give small-business owners an easy way to view their financials and isolate important metrics. A serial entrepreneur, Mr. Justen raised several million dollars from investors to start the company, which its investors valued at $100 million at its peak in 2008. At about that time, Mr. Justen and his board, seeing tremendous growth opportunity for the business, especially in international markets, turned down an offer to buy the company.           –    The New York Times

—————–

Makaseh is the answer.

Exploiting weaknesses is the name of the game. We still use the word Trojan as an idiom or a punch phrase to scare people; what we forget is that after Troy nobody was able to skillfully use the method. Every General was aware and remedied their defense strategies.

Even after so much of damages done and yet more worse expected we still accept software that generalize a Trojan attack. When strict identity controls are executed, no one else can access, read and benefit from anything that one stores in a computer, whether on the cloud or at home.

One Response to “Can This Company Recover From a Cyberattack?”

  1. Carl Thorp August 23, 2012 at 6:55 am #

    An analogy with the horse of Tory simply does not work. This was not the last successful battlefield. Think of the war wining water tanks of World War 1, their original name was land ships. The deception of calling them water tanks was so successful the name tank is still used today. The list is endless.

    As long as people remain gullible these deceptions will happen. Education helps, but sometimes even the educated get caught out. Strict controls help, but employees will find both legitimate and illegitimate ways round them. It’s a fact of life the organisations take risks, we have to learn to live with this, defend against attack, quickly identify breaches, and have the tools and skills on tap to quickly recover from them.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: