Thursday, July 9, 2015

NYSE, WSJ.com & United Grounded; Information Security Stocks Take Off

NYSE, WSJ.com & United Grounded; Information Security Stocks Take Off


Technology blunders grounded or delayed over 800 flights, halted trading on the New York Stock Exchange (NYSE), and brought down the Wall Street Journal’s website all in the span of a few hours during the morning of Wednesday, July 8th, 2015.  The small window during which these three companies were impacted led many (including personnel at the FBI and Homeland Security) to speculate that cyber-attacks may have been the culprit. 
As morning turned to late afternoon, Director Jeh Johnson of Homeland Security took the reassuring yet somewhat unusual step to publicly deny that any of the day’s events were caused by cyber-attacks.  With this denial came the implied, albeit unintended confirmation that these companies had been severely impacted by some inevitable combination of poor technology planning, implementation, and/or maintenance.  To illustrate, the outage at the Wall Street Journal was conceivably due to an overload of people seeking more information on the NYSE outage.  Separately, United (the second-largest US airline) later admitted that a “network connectivity issue” impacted their systems.  Lastly, the NYSE outage was said by an internal spokesperson to be caused by a “configuration issue”.

Just a Bad Day in the Server Room

Days like “United/NYSE/WSJ Wednesday” remind us that while burgeoning cybersecurity threats and cyber attacks have been keeping Chief Information Security Officers (CISOs) up at night, companies and their Chief Information Officers (CIOs) still have other pain points to worry about.  Not all technology issues are caused by external, evil actors.  Sometimes, the root cause for really expensive days like this can be linked back to old-fashioned bad decisions in the server room.
While none of the day’s big three outages seem to have been caused by a cyber attack, news of the day was rife with speculation to the contrary.  Key stocks in the cyber security sector were undoubtedly thankful for the gains on a day when the DOW Jones industrial average dropped over 260 points by the closing bell.   These gains highlight how even the perception of a hacking attack can benefit cybersecurity technology companies - and instill fear in companies that (probably should) contract their services, buy their software, or train for their proper implementation. 
Information security specialists have long deplored that many companies do not take cyber security seriously until they themselves have been breached.  Target learned a valuable lesson in 2013 with a much-publicized breach that is projected to have cost the company nearly $200 million dollars.  This case was clearly an awareness ‘tipping point’ felt across all IT departments worldwide - Gartner Group predicts global IT security spending to reach $76.9 billion in 2015 (up 17% from 2013 levels). 
80% of outages impacting mission-critical services will be caused by people and process issues
Hopefully "United/NYSE/WSJ Wednesday" will keep companies focused on the more mundane "blocking and tackling" functions critical to network and application uptime.  A recent Gartner study projected that through this year, 80% of outages impacting mission-critical services will be caused by people and process issues, and more than 50% of those outages will be caused by change/configuration/release integration and hand-off issues.
Many of the most significant risks to an enterprise are also the most routine:
  • lack of management buy-in or poor funds allocation
  • insufficient training and retraining
  • mismanagement of system and application upgrades
  • inadequate documentation
  • poorly designed applications
  • inadequate testing
  • lack of redundancy in the architecture and infrastructure
While the threat of cyber attacks is more prevalent than ever, most organizations don’t need to be attacked by from external parties - they can implode from the inside and from the most insipid causes.
At Training Camp, our outcome-based information technology management and information security "boot camp" courses will prepare managers and practitioners alike to safeguard against internal and external threats.  Our most popular courses include:

Information Security

Information Technology Management

Information Technology Practitioner

57 comments :

  1. Good article. Thank you for sharing.

    ReplyDelete
  2. Thanks for the blog loaded with so many information. Stopping by your blog helped me to get what I was looking for. Sioux Falls IT Services

    ReplyDelete
  3. The majority of these organizations offer a group of exceptionally talented experts. Construction site security

    ReplyDelete
  4. You made such an interesting piece to read, giving every subject enlightenment for us to gain knowledge. Thanks for sharing the such information with us to read this... trading

    ReplyDelete
  5. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. the lost ways 2 book

    ReplyDelete
  6. Think about space for preparing hardware. Other than the outfitting in the room, will there should be space for extra gear, for example, training room rental

    ReplyDelete
  7. Ongoing measurements concede that half of these occurrences go unreported.cyber security training in hyderabad

    ReplyDelete
  8. Your article has piqued a lot of positive interest. I can see why since you have done such a good job of making it interesting. seo

    ReplyDelete
  9. When the use of Security Robots become more common place, 24response their use will likely reduce the number of human security officers needed in many security venues.

    ReplyDelete
  10. i never know the use of adobe shadow until i saw this post. thank you for this! this is very helpful. Inpatient rehab Miami FL

    ReplyDelete
  11. Awesome article, it was exceptionally helpful! I simply began in this and I'm becoming more acquainted with it better! Cheers, keep doing awesome!  Treatment centers in el paso texas

    ReplyDelete
  12. howdy, your websites are really good. I appreciate your work. quality backlink

    ReplyDelete
  13. An interesting dialogue is price comment. I feel that it is best to write more on this matter, it may not be a taboo topic however usually individuals are not enough to talk on such topics. To the next. Cheers. manually backlinks

    ReplyDelete
  14. You make so many great points here that I read your article a couple of times. Your views are in accordance with my own for the most part. This is great content for your readers.  Drug Rehab daytona beach florida

    ReplyDelete
  15. This is a good post. This post gives truly quality information. I’m definitely going to look into it. Really very useful tips are provided here. Thank you so much. Keep up the good works. search engine optimization

    ReplyDelete
  16. Hello, this weekend is good for me, since this time i am reading this enormous informative article here at my home. Drug Rehab chicago  illinois

    ReplyDelete
  17. Thank you for putting all these strategies into a very readable place. It shows your ability and great skills. keep sharing such article in future. security cameras Naples fl

    ReplyDelete
  18. Extremely useful information which you have shared here. This is a great way to enhance knowledge for us, and also beneficial for us. Thank you for sharing an article like this. cybersecurity services Orange county

    ReplyDelete
  19. Among different driving mechanical developments, inverter innovation is in popularity these days. It has been intended to abridge power utilization. Coil Unit Manufacturers

    ReplyDelete
  20. Impressive and powerful suggestion by the author of this blog are really helpful to me. antivirus protection brisbane

    ReplyDelete
  21. I honestly appreciate the blog you have posted. Really looking forward to this kind of words.
    Hitachi best ac

    ReplyDelete
  22. "Thanks for your marvelous posting! I actually enjoyed reading it, you could be a great author.The jackets that we sell are replicas of the coats worn by top television celebrities because it is a growing trend to copy them when it comes to fashion. These celebrities have really become the trendsetters. This leisure was hitherto in reach of only the rich and the rest could only dream about it. But now these bbc varsity jacket are available for all people who want to buy them because of our affordable prices. So we welcome you to come and buy celebrity jackets of excellent quality and know more about us and our products!

    "

    ReplyDelete
  23. It is necessary for individuals and companies to learn about information security and how they can protect themselves in digital world. Thank you for sharing such insightful article. Great blog. Private cyber security companies

    ReplyDelete
  24. Very helpful hints in your blog posts. Thanks for sharing 789bet

    ReplyDelete
  25. You have worked nicely with your insights that makes our work easy. The information you have provided is really factual and significant for us. Keep sharing these types of article, Thank you. Cyber Security IT Courses In Canada

    ReplyDelete
  26. Your blog is very valuable which you have shared here. I appreciate your efforts which you have put into this article and also it is a gainful article for us. Thank you for sharing this article here. effective penetration testing cyber security

    ReplyDelete
  27. I have learn several good stuff here. Definitely worth bookmarking for revisiting. I surprise how so much effort you place to make this type of fantastic informative web site Feel free to visit my website; 먹튀검증

    ReplyDelete
  28. Wow this blog is awesome. Wish to see this much more like this. Thanks for sharing your information! Server motherboards

    ReplyDelete
  29. This article provided me with a wealth of information. The article is both educational and helpful. Thank you for providing this information. Keep up the good work. Hire Hacker For Email Password

    ReplyDelete
  30. Thanks for sharing this article here about the Information Security. Your article is very informative and I will share it with my other friends as the information is really very useful. Keep sharing your excellent work.Hire A Verified Hacker in Usa

    ReplyDelete
  31. I have to search sites with relevant information on given topic and provide them to teacher our opinion and the article.
    고스톱
    섯다

    ReplyDelete
  32. I have recently started a web site, the information you provide on this site has helped me tremendously. Thank you for all of your time & work.
    안전놀이터
    토토사이트

    ReplyDelete
  33. Thanks for the blog very helpful and informative keep going.
    Buy Refurbished Dell Server

    ReplyDelete
  34. Elegant patches was established back in 2010. We are one of the leading providers of custom patches online in the USA, offering our services to businesses and individuals across the North-America, Australia, and Europe. best security guard services near me

    ReplyDelete
  35. Thanks for sharing such an informative Article. I really Enjoyed. It was great reading this article. Keep posting more articles onCyber security solutions

    ReplyDelete

  36. 토토사이트
    프로토

    Have you ever considered writing an e-book or guest authoring on other sites? I have a blog centered on the same information you discuss and would love to have you share some stories/information. I know my audience would enjoy your work. If you are even remotely interested, feel free to send me an e-mail

    ReplyDelete
  37. 스포츠토토티비
    스포츠토토


    Hey there! I understand this is somewhat off-topic but I had to ask. Does running a well-established blog such as yours take a large amount of work? I'm completely new to running a blog however I do write in my diary daily. I'd like to start a blog so I can easily share my experience and feelings online. Please let me know if you have any kind of suggestions or tips for brand new aspiring bloggers. Appreciate it!

    ReplyDelete
  38. Thank you for this article.. Travelers around the world who wish to travel the Kenya need to apply for Kenya travel visas through online e visa portal. That offers the fast and secure visa services.

    ReplyDelete
  39. Your article is well-written and understandable even to a novice. As a result, beginners may find it incredibly useful. Thank you very much for sharing that information with us. Writers like you inspire me and I admire and respect them.
    nhpe

    ReplyDelete
  40. The best activator for windows 10 It is a full suite that gives you the software gadgets, as well as abilities, approve the both for my part and also satisfied users to replace it powerfully. Windows 10 Activator whole will offer you more relevant advanced features that don’t consist of in one-of-a-kind vintage domestic Windows version in addition to Windows 8 and 8.1. It provides the all the one’s abilities that may be plenty crucial and demanding clients. This model has contained all modern day and changed functions of the computer laptop, also, to starting menu and virtual laptop shape upload to the experience for an assist.

    ReplyDelete
  41. Cyberattacks can come at any time, and all it takes is one unknowing error to be in serious trouble. Data Security Analyst Career Overview

    ReplyDelete
  42. I was reading some of your content on this website and I conceive this internet site is really informative ! Keep on putting up. cloud security services

    ReplyDelete
  43. Interesting stuff to read. This blog regarding Managed IT Security Services is truly helpful for me. Thank you for sharing such an informative blog with us.

    ReplyDelete
  44. You have done good work by publishing this article here. I found this article too much informative, and also it is beneficial to enhance our knowledge. Grateful to you for sharing an article like this. Cloud For Developers in Saudi Arabia

    ReplyDelete
  45. 토토사이트 It's actually a great and useful piece of information. I am glad that you shared this helpful info with us. Thanks for sharing.

    ReplyDelete
  46. 스포츠토토티비 Just want to say your article is as surprising.

    ReplyDelete
  47. Yay google is my queen assisted me to find this outstanding website! 토토365프로


    ReplyDelete
  48. I read the above article and I got some knowledge from your article. Identity Theft Protection Software, It's actually great and useful data for us. Thanks for share it.

    ReplyDelete
  49. This comment has been removed by the author.

    ReplyDelete
  50. Nice and interesting information and informative too. Vonex phones

    ReplyDelete
  51. Your article is well written and simple to understand. You make excellent points. Thanks you sharing great blog...

    ReplyDelete
  52. Wow it is really wonderful and awesome thus it is very much useful for me to understand many concepts and helped me a lot.
    ERP Software Companies

    ReplyDelete
  53. Share great information about your blog , Blog really helpful for usPCI Inspection Brisbane

    ReplyDelete
  54. Thank you for being a beacon of knowledge in the vast sea of the internet. Your blog is a guiding light for curious minds.Ley de Divorcio de Nueva York Pensión Alimenticia

    ReplyDelete
  55. A protective order in Virginia is a legal measure designed to safeguard individuals from domestic violence, harassment, or threats. Violating such an order can result in serious legal consequences, including fines and imprisonment. Obtaining a protective order is a critical step for those seeking protection from potential harm in Virginia. how to get a protective order in virginia

    ReplyDelete