SlideShare a Scribd company logo
1 of 1
Download to read offline
ICT 85THE ECONOMIC UPDATE 0 6 / 0 8
“Simply put, to catch a thief you must think
like a thief,” says Mr Borg. “To this end we have
formed a team of Certified Ethical Hackers
and Penetration Testers, network engineers and
a team of social engineering professionals, to
provide extensive and realistic IT security audits
for companies” he explains.
Although hacking has a low radar profile in
Malta, the risk of our networks being comprised
is actually rising exponentially. The tools used in
this activity are readily available on the internet
and forums that provide assistance and support
to hackers spring up with regularity.
In addition,more and more people are studying
IT in greater depth, allowing them to develop the
knowledge necessary to begin taking advantage
of these readily available hacking tools.
Today, businesses rely on the data contained
within their servers and the protection of this
information is essential to the operation of the
enterprise. Customers trust us to safeguard their
personal details and a data theft severs this trust,
with catastrophic effects on your customer base.
So how do hackers ply their trade and what
methods do they use to get into our systems?
Forget the Hollywood image of a young boy
sat alone with a giant computer, using it to gain
access to private networks. Instead, professional
hackers have a far greater variety of methods at
their disposal and some of them are very tricky
indeed.
Applying techniques detailed in the hacker’s
playbook, isecmalta.com put a network through
its paces to find out just how secure it really is.
“Social engineering, or the art of extracting
restricted information from employees, is one of
the most powerful weapons in a hacker’s arsenal
and one of the best ways to gain access to a
system,” Mr Borg explains.
This is achieved in a variety of ways, ranging
from simply phoning employees to request
information whilst impersonating IT support
staff, to actually applying for a computer-related
job at the company being hacked and using the
resulting interview to ask specific information
about its network and its security.
“It is amazing the information you can get
simply by being polite and friendly,” Mr Borg
remarks. “Ironically, the methods are even more
effective when used on trained interviewers.
Actually, I enjoy the challenge…” he adds with
a smile.
Some HR executives and IT administrators
may be squirming in their seats,realising that they
are guilty of being a little loose with corporate
information during job interviews. However,
there are other loop holes that can be exploited
by a serious hacker ± and these involve asking no
questions at all.
Visitors are rarely monitored on company
property and few organisations have a strict visitor
policy. Often, guests are simply given directions
to the relevant department and allowed to wander
over there on their own steam. Such practices are
highly dangerous and in doing so you could be
leaving your system wide open for attack.
Mr Borg is clear how this can be exploited: “A
hacker only needs a few seconds to slip a floppy
disc into a drive and this can install a variety of
anonymous malicious applications. Such software
can scan networks from that infected terminal and
send out the recorded information to a hacker.
Floppy drives are rarely used anymore and this
has the added advantage that such discs are likely
to go undetected for some time.”
Some may be reading this article, thinking
that they have no data worth stealing. However, a
recent case in the US had three hackers charged
with intercepting credit card information from
cash registers at a restaurant chain. The hackers
were located in three different countries, showing
that such threats are global.In addition,isecmalta.
com was recently involved in a case where a local
company was targeted by French hackers.
And your corporate data is worth a lot of
money to these people. Your competitors, for
example, may be interested in buying a copy of
your customer database, or plans of your latest
product. Hackers are quite unethical about what
they do with your data after they steal it and it
often goes to the highest bidder, or they may even
offer to sell it back to you at a price ± something
known as data kidnapping.
Of course such data holds high value when
you are unaware that you have been hacked and
that your security has been compromised. For this
reason professional hackers are adept at covering
their tracks.
“There is a distinct lack of awareness in Malta
about the dangers of hacking and we need to alter
that, especially as our island is becoming more
and more technologically advanced,” Mr Borg
notes.
He is adamant that IT administrators are
not able to verify the security of their own
network simply because they know it too well
and take some of its features for granted. Hence,
companies should bring in specialised ethical
hackers to independently attack the system and
issue a comprehensive security audit report that
highlights any chink in the armour.
As our reliance on digital tools increases, we
need to protect ourselves with adequate security.
Failure to look after our vital IT resources leaves
us wide open to today’s hi-tech thieves.Otherwise
you may just find your sensitive information
becoming public knowledge.
The word ‘hacking’ is guaranteed to send shivers down corporate spines. Stolen
data, compromised passwords and crashed servers are the stuff of many CEOs’
nightmares. Justin Tonna met with Fabian Borg, Managing Director of isecmalta.com,
who tells him why companies should actually pay to have their systems hacked.

More Related Content

What's hot

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrimepronab Kurmi
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecuritySatnam Singh
 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron ShrabergCODE BLUE
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...CODE BLUE
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersJaime Manteiga
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 

What's hot (20)

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 

Viewers also liked

http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...
http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...
http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...อรภัค สุวรรณภักดี
 
речушка клуб родник
речушка клуб родникречушка клуб родник
речушка клуб родникGalina Mishina
 
iküsz_mt_2007-09-15
iküsz_mt_2007-09-15iküsz_mt_2007-09-15
iküsz_mt_2007-09-15Peter Varga
 
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2ed
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2edPorque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2ed
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2edEric Campos Bastos Guedes
 
Companybopbaddi 140515091911-phpapp02
Companybopbaddi 140515091911-phpapp02Companybopbaddi 140515091911-phpapp02
Companybopbaddi 140515091911-phpapp02Mlm Leader Debbarma
 
working of tablet punching machine
working of tablet punching machineworking of tablet punching machine
working of tablet punching machinechetan1332
 
Coursera music-ensembles 2015
Coursera music-ensembles 2015Coursera music-ensembles 2015
Coursera music-ensembles 2015Erin Nordin
 
фгос презентация
фгос презентацияфгос презентация
фгос презентацияLala Satak
 

Viewers also liked (15)

http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...
http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...
http://www.slideshare.net/mylifeisdigital/ปฏิรูปการศึกษาด้วยระบบการศึกษาฟรี M...
 
речушка клуб родник
речушка клуб родникречушка клуб родник
речушка клуб родник
 
iküsz_mt_2007-09-15
iküsz_mt_2007-09-15iküsz_mt_2007-09-15
iküsz_mt_2007-09-15
 
El uso de las tic en la docencia
El uso de las tic en la docenciaEl uso de las tic en la docencia
El uso de las tic en la docencia
 
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2ed
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2edPorque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2ed
Porque o inca deve me pagar para resgatar o modo de preparo do carboncellox 2ed
 
Companybopbaddi 140515091911-phpapp02
Companybopbaddi 140515091911-phpapp02Companybopbaddi 140515091911-phpapp02
Companybopbaddi 140515091911-phpapp02
 
Ch16
Ch16Ch16
Ch16
 
working of tablet punching machine
working of tablet punching machineworking of tablet punching machine
working of tablet punching machine
 
Pulsa poema
Pulsa poemaPulsa poema
Pulsa poema
 
Coursera music-ensembles 2015
Coursera music-ensembles 2015Coursera music-ensembles 2015
Coursera music-ensembles 2015
 
resume - Copy
resume - Copyresume - Copy
resume - Copy
 
фгос презентация
фгос презентацияфгос презентация
фгос презентация
 
acrostico
acrosticoacrostico
acrostico
 
RESUME 2
RESUME 2RESUME 2
RESUME 2
 
Diagrama actual
Diagrama actualDiagrama actual
Diagrama actual
 

Similar to Malta Economic Update 06 2008 - isec interview

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces Edology
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslecscottdp3
 
Cyber crime - Understanding the Organised Criminal Group model
Cyber crime -  Understanding the Organised Criminal Group modelCyber crime -  Understanding the Organised Criminal Group model
Cyber crime - Understanding the Organised Criminal Group modelInnesGerrard
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 

Similar to Malta Economic Update 06 2008 - isec interview (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Internet
InternetInternet
Internet
 
expert tips
expert tipsexpert tips
expert tips
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
Cyber crime - Understanding the Organised Criminal Group model
Cyber crime -  Understanding the Organised Criminal Group modelCyber crime -  Understanding the Organised Criminal Group model
Cyber crime - Understanding the Organised Criminal Group model
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Retail
Retail Retail
Retail
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 

Malta Economic Update 06 2008 - isec interview

  • 1. ICT 85THE ECONOMIC UPDATE 0 6 / 0 8 “Simply put, to catch a thief you must think like a thief,” says Mr Borg. “To this end we have formed a team of Certified Ethical Hackers and Penetration Testers, network engineers and a team of social engineering professionals, to provide extensive and realistic IT security audits for companies” he explains. Although hacking has a low radar profile in Malta, the risk of our networks being comprised is actually rising exponentially. The tools used in this activity are readily available on the internet and forums that provide assistance and support to hackers spring up with regularity. In addition,more and more people are studying IT in greater depth, allowing them to develop the knowledge necessary to begin taking advantage of these readily available hacking tools. Today, businesses rely on the data contained within their servers and the protection of this information is essential to the operation of the enterprise. Customers trust us to safeguard their personal details and a data theft severs this trust, with catastrophic effects on your customer base. So how do hackers ply their trade and what methods do they use to get into our systems? Forget the Hollywood image of a young boy sat alone with a giant computer, using it to gain access to private networks. Instead, professional hackers have a far greater variety of methods at their disposal and some of them are very tricky indeed. Applying techniques detailed in the hacker’s playbook, isecmalta.com put a network through its paces to find out just how secure it really is. “Social engineering, or the art of extracting restricted information from employees, is one of the most powerful weapons in a hacker’s arsenal and one of the best ways to gain access to a system,” Mr Borg explains. This is achieved in a variety of ways, ranging from simply phoning employees to request information whilst impersonating IT support staff, to actually applying for a computer-related job at the company being hacked and using the resulting interview to ask specific information about its network and its security. “It is amazing the information you can get simply by being polite and friendly,” Mr Borg remarks. “Ironically, the methods are even more effective when used on trained interviewers. Actually, I enjoy the challenge…” he adds with a smile. Some HR executives and IT administrators may be squirming in their seats,realising that they are guilty of being a little loose with corporate information during job interviews. However, there are other loop holes that can be exploited by a serious hacker ± and these involve asking no questions at all. Visitors are rarely monitored on company property and few organisations have a strict visitor policy. Often, guests are simply given directions to the relevant department and allowed to wander over there on their own steam. Such practices are highly dangerous and in doing so you could be leaving your system wide open for attack. Mr Borg is clear how this can be exploited: “A hacker only needs a few seconds to slip a floppy disc into a drive and this can install a variety of anonymous malicious applications. Such software can scan networks from that infected terminal and send out the recorded information to a hacker. Floppy drives are rarely used anymore and this has the added advantage that such discs are likely to go undetected for some time.” Some may be reading this article, thinking that they have no data worth stealing. However, a recent case in the US had three hackers charged with intercepting credit card information from cash registers at a restaurant chain. The hackers were located in three different countries, showing that such threats are global.In addition,isecmalta. com was recently involved in a case where a local company was targeted by French hackers. And your corporate data is worth a lot of money to these people. Your competitors, for example, may be interested in buying a copy of your customer database, or plans of your latest product. Hackers are quite unethical about what they do with your data after they steal it and it often goes to the highest bidder, or they may even offer to sell it back to you at a price ± something known as data kidnapping. Of course such data holds high value when you are unaware that you have been hacked and that your security has been compromised. For this reason professional hackers are adept at covering their tracks. “There is a distinct lack of awareness in Malta about the dangers of hacking and we need to alter that, especially as our island is becoming more and more technologically advanced,” Mr Borg notes. He is adamant that IT administrators are not able to verify the security of their own network simply because they know it too well and take some of its features for granted. Hence, companies should bring in specialised ethical hackers to independently attack the system and issue a comprehensive security audit report that highlights any chink in the armour. As our reliance on digital tools increases, we need to protect ourselves with adequate security. Failure to look after our vital IT resources leaves us wide open to today’s hi-tech thieves.Otherwise you may just find your sensitive information becoming public knowledge. The word ‘hacking’ is guaranteed to send shivers down corporate spines. Stolen data, compromised passwords and crashed servers are the stuff of many CEOs’ nightmares. Justin Tonna met with Fabian Borg, Managing Director of isecmalta.com, who tells him why companies should actually pay to have their systems hacked.