Hackers, extortionists and other cyber criminals are a threat to organisations of all sizes, but are especially so for small and medium-sized businesses (SMEs), which are often seen as insecure, easy targets.
That's what a representative from the Ministry of Defence (MoD) - who wishes to remain anonymous - told a gathering of SME owners and cyber security experts at an event held at Coventry University.
The event, entitled "The Cyber Security Problem and why SMEs have a Critical Role to Play", was organised by Dr Siraj Shaikh, cyber security researcher and leader of the university's ethical hacking course and brought some eye-opening warnings to the SMEs gathered in the TechnoCentre (pictured).
"There's a threat; they really are out to get you. We know they're out to get you, we really, really, really do know that they're out to get you. We have been there, seen it, watched what's coming out of the networks," said the MoD representative, who described the cyber threat as "astonishing, with industrial-scale processes involving many thousands of people behind state-sponsored espionage and organised crime."
"If you work in the defence area, that is what's out there trying to get into your system," said the spokesman, who referenced a National Audit Office report that put the cost of cyber crime to the UK as anything from £18bn to £27bn per year.
"So picture in your mind what you imagine an astonishing industrial-scale cyber intelligence operation looks like. What do you imagine an astonishing industrial-scale organised crime operation looks like? That's what's trying to get into your systems," he added, in an effort to get members of the audience - many of whom knew little about IT - to grasp the cyber threats they face on a daily basis.
The MoD representative also warned that to cyber criminals, SMEs were just a commodity, and if hackers have a desire to steal information, it's no skin of their nose if a data breach meant the end of a small organisation.
"Your business to them is expendable, they just want the information you have. You could be on their shopping list: the intellectual property that's the lifeblood of the business, they want that. They want the MoD's information," he said.
[Turn to page 2]
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)