Thursday, July 9, 2015

NYSE, WSJ.com & United Grounded; Information Security Stocks Take Off

NYSE, WSJ.com & United Grounded; Information Security Stocks Take Off


Technology blunders grounded or delayed over 800 flights, halted trading on the New York Stock Exchange (NYSE), and brought down the Wall Street Journal’s website all in the span of a few hours during the morning of Wednesday, July 8th, 2015.  The small window during which these three companies were impacted led many (including personnel at the FBI and Homeland Security) to speculate that cyber-attacks may have been the culprit. 
As morning turned to late afternoon, Director Jeh Johnson of Homeland Security took the reassuring yet somewhat unusual step to publicly deny that any of the day’s events were caused by cyber-attacks.  With this denial came the implied, albeit unintended confirmation that these companies had been severely impacted by some inevitable combination of poor technology planning, implementation, and/or maintenance.  To illustrate, the outage at the Wall Street Journal was conceivably due to an overload of people seeking more information on the NYSE outage.  Separately, United (the second-largest US airline) later admitted that a “network connectivity issue” impacted their systems.  Lastly, the NYSE outage was said by an internal spokesperson to be caused by a “configuration issue”.

Just a Bad Day in the Server Room

Days like “United/NYSE/WSJ Wednesday” remind us that while burgeoning cybersecurity threats and cyber attacks have been keeping Chief Information Security Officers (CISOs) up at night, companies and their Chief Information Officers (CIOs) still have other pain points to worry about.  Not all technology issues are caused by external, evil actors.  Sometimes, the root cause for really expensive days like this can be linked back to old-fashioned bad decisions in the server room.
While none of the day’s big three outages seem to have been caused by a cyber attack, news of the day was rife with speculation to the contrary.  Key stocks in the cyber security sector were undoubtedly thankful for the gains on a day when the DOW Jones industrial average dropped over 260 points by the closing bell.   These gains highlight how even the perception of a hacking attack can benefit cybersecurity technology companies - and instill fear in companies that (probably should) contract their services, buy their software, or train for their proper implementation. 
Information security specialists have long deplored that many companies do not take cyber security seriously until they themselves have been breached.  Target learned a valuable lesson in 2013 with a much-publicized breach that is projected to have cost the company nearly $200 million dollars.  This case was clearly an awareness ‘tipping point’ felt across all IT departments worldwide - Gartner Group predicts global IT security spending to reach $76.9 billion in 2015 (up 17% from 2013 levels). 
80% of outages impacting mission-critical services will be caused by people and process issues
Hopefully "United/NYSE/WSJ Wednesday" will keep companies focused on the more mundane "blocking and tackling" functions critical to network and application uptime.  A recent Gartner study projected that through this year, 80% of outages impacting mission-critical services will be caused by people and process issues, and more than 50% of those outages will be caused by change/configuration/release integration and hand-off issues.
Many of the most significant risks to an enterprise are also the most routine:
  • lack of management buy-in or poor funds allocation
  • insufficient training and retraining
  • mismanagement of system and application upgrades
  • inadequate documentation
  • poorly designed applications
  • inadequate testing
  • lack of redundancy in the architecture and infrastructure
While the threat of cyber attacks is more prevalent than ever, most organizations don’t need to be attacked by from external parties - they can implode from the inside and from the most insipid causes.
At Training Camp, our outcome-based information technology management and information security "boot camp" courses will prepare managers and practitioners alike to safeguard against internal and external threats.  Our most popular courses include:

Information Security

Information Technology Management

Information Technology Practitioner

23 comments :

  1. Good article. Thank you for sharing.

    ReplyDelete
  2. Thanks for the blog loaded with so many information. Stopping by your blog helped me to get what I was looking for. Sioux Falls IT Services

    ReplyDelete
  3. The majority of these organizations offer a group of exceptionally talented experts. Construction site security

    ReplyDelete
  4. You made such an interesting piece to read, giving every subject enlightenment for us to gain knowledge. Thanks for sharing the such information with us to read this... trading

    ReplyDelete
  5. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. the lost ways 2 book

    ReplyDelete
  6. breach the security I’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article...

    ReplyDelete
  7. Think about space for preparing hardware. Other than the outfitting in the room, will there should be space for extra gear, for example, training room rental

    ReplyDelete
  8. Ongoing measurements concede that half of these occurrences go unreported.cyber security training in hyderabad

    ReplyDelete
  9. Your article has piqued a lot of positive interest. I can see why since you have done such a good job of making it interesting. seo

    ReplyDelete
  10. When the use of Security Robots become more common place, 24response their use will likely reduce the number of human security officers needed in many security venues.

    ReplyDelete
  11. i never know the use of adobe shadow until i saw this post. thank you for this! this is very helpful. Inpatient rehab Miami FL

    ReplyDelete
  12. Awesome article, it was exceptionally helpful! I simply began in this and I'm becoming more acquainted with it better! Cheers, keep doing awesome!  Treatment centers in el paso texas

    ReplyDelete
  13. Freelance maintenance technicians also benefit from establishing relationships with multiple clients. Working as a freelancer, you’ll gain employment experience with a variety of businesses, boosting your overall skill set and providing you with more work opportunities in the future.

    maintenance technician

    ReplyDelete
  14. howdy, your websites are really good. I appreciate your work. quality backlink

    ReplyDelete
  15. An interesting dialogue is price comment. I feel that it is best to write more on this matter, it may not be a taboo topic however usually individuals are not enough to talk on such topics. To the next. Cheers. manually backlinks

    ReplyDelete
  16. You make so many great points here that I read your article a couple of times. Your views are in accordance with my own for the most part. This is great content for your readers.  Drug Rehab daytona beach florida

    ReplyDelete
  17. This is a good post. This post gives truly quality information. I’m definitely going to look into it. Really very useful tips are provided here. Thank you so much. Keep up the good works. search engine optimization

    ReplyDelete
  18. Hello, this weekend is good for me, since this time i am reading this enormous informative article here at my home. Drug Rehab chicago  illinois

    ReplyDelete
  19. Jika bettor ingin mengetahui kondisi yang ada pada saat ini, sudah terdapat ratusan penyedia permainan togel online. Sehingga rasanya untuk dapat mengetahui apa saja yang ada dalam sebuah bandar satu persatu hampir tidak mungkin. Karena jika bettor melakukan hal tersebut, maka waktu bettor akan habis untuk mencari saja tanpa menghasilkan untung apapun nanti. Dan untuk menghindari hal tersebut, lebih baik bettor bermain di bandar togel bonus terbesar yang akan direkomendasikan. Kunjungi segera situs https://dced.net/.

    ReplyDelete
  20. blog alternatif dari agen togel resmi di indonesia dengan bonus deposit harian terbesar https://retailadventures.com.au/ terbukti sangat nyata hanya Di Unsurtoto. Dengan berbagai bonus ini tentu saja akan membuat kalian semakin untung, bukan? Yuk langsung saja gabung sekarang juga!

    ReplyDelete
  21. You made such an interesting piece to read, giving every subject enlightenment for us to gain knowledge. Thanks for sharing the such information with us to read this... https://everlighten.com/

    ReplyDelete
  22. Thank you for putting all these strategies into a very readable place. It shows your ability and great skills. keep sharing such article in future. security cameras Naples fl

    ReplyDelete
  23. Extremely useful information which you have shared here. This is a great way to enhance knowledge for us, and also beneficial for us. Thank you for sharing an article like this. cybersecurity services Orange county

    ReplyDelete