• Phone
  • Contact us
  • Locations
  • Search
  • Menu

Share

  • Add this article to your LinkedIn page
  • Add this article to your Twitter feed
  • Add this article to your Facebook page
  • Email this article
  • View or print a PDF of this page
  • Share further
  • Add this article to your Pinterest board
  • Add this article to your Google page
  • Share this article on Reddit
  • Share this article on StumbleUpon
  • Bookmark this page
.
 
Close this video

Protecting your data against organised hackers

Søren Lehn | Computerworld | 7 April 2015

PA IT strategy expert, Søren Lehn, has had a byline article published in Computerworld looking at how companies protect their most important assets. Søren refers to a survey PA has carried out among Denmark’s largest companies that shows it is increasingly difficult to protect a company’s most vital assets as IT platforms become more complex. Moreover, managers do not seem to take the increased cyber threat seriously.

Søren says: “Hackers are very skilled and well organised. Today, IT experts develop intelligent tools that are resold to criminals who use them in targeted and deliberate attacks. In some countries, being a cybercriminal has become an everyday job.”

According to Søren, modern hacking tools are able to get around classic perimeter based security and may be used to gain access to a company through spear fishing. Also, the number of platforms on which to target attacks has increased, eg with newer and more advanced mobile devices, social media and cloud-based services.

Søren encourages companies to build a strong defence around their most vital data. Companies’ underlying IT systems are becoming increasingly complex, a development which is closely connected to increased digitalisation and is often caused by a lack of coherence between the overall IT strategy and the execution of it. Another defect in the data protection is the lack of understanding and commitment from management.

Søren says: “A company’s defence and general IT security policy must be deeply rooted in the top management who also needs to ensure their employees comply with the agreed security policy.”

According to Søren, one thing is certain: it is not a matter of if or when your company will be exposed to a cyber-attack – the question is if you’ll notice before it’s too late.

To find out more about our work with IT security, click here or contact us.

Find out more about our work in Digital.

Contact the Digital team

Anita Chandraker

Anita Chandraker

Email

Connect

Kevin O'Shaughnessy

Kevin O'Shaughnessy

Email

Connect

By using this website, you accept the use of cookies. For more information on how to manage cookies, please read our privacy policy.

×