BRISBANE, QLD, AUSTRALIA, May 26, 2021 /EINPresswire.com/ — The United States, Europe, Australia, and many other countries are focusing their attention on Cybersecurity dedicating billions & trillions of dollars which if spent accurately in the relevant areas is money well spent. If it is spent on previous methods, approaches and not on new/innovative ones, then it is frankly wasted.
Re-thinking the approach to securing systems with particular emphasis on addressing each layer that can be breached; network, server, middleware, transport, communication, data, hardware, etc.
Provide first a logical, then a physical implementation method to pre-empt & prevent the breach from occurring is required. The existing methods have not worked, we need to completely rethink how we move forward to secure data, networks, and the several layers of a computer system.
We need to use modern IT precepts, such as AI/Deep ML, Automation, Intelligent Analytics, Software Robotics, etc to pre-empt and impede such attacks. Cyberwarfare is frankly a war of a different kind declared on the free world supported by hostile government institutions, as we are all aware. To win this war, a combination of both an offensive and defensive approach needs to be employed.
So far, we seem to be deploying defensive methods that are now obsolete.
The need to innovate, think up new approaches, change the way we capture, store, and use data for starters cannot be overemphasised. Organisations need to employ/develop like for like skillset or even better or potential to be better to stand any chance at all, of repelling these attacks. To win the Cyberwarfare or successfully repeal any such attacks will come down to innovation, a different way of thinking, and superior skillsets or at least similar.
There is obviously a pressing need to out-think and outsmart these cybercriminals.
Companies and individuals alike perhaps need to stop holding or storing large volumes of data in Excel Spreadsheets, Word Documents if they do not really need to, because ransomware attacks on these file types are very easily carried out just like taking candy from a baby.
Data needs to be stored in database software applications that can be custom developed or off the shelf ready-to-use software packages like Excelitte (www.excelitte.com), which allows for encrypting the data when stored, biometrics, and two (2FA) or three (3FA) factor authentication to retrieve or view the data.
Also, theft or loss of data when stored in Excelitte is near impossible because the data is automatically backed up and sent to the user. Please visit www. excelitte.com to request a demo and a free trial with no obligation to purchase it.
At TEMSCONSU we are also working on other innovative solutions that will reverse engineer current methods of carrying out these attacks, pre-empt and then offensively work very effectively to impede them.