It takes years to build a reputation and a
few minutes of hacking to ruin it
Cyber attacks in todays world are no longer stopped by firewalls or antivirus software. The question companys and institutions need to ask them selfes is not if it will happen but rather when it will happen.
And if your not prepared when it happens, you could loose both money and reputation.
The cost of doing to little
The average cost of a data breach is annually calculated by IBM and the Ponemon Institute, and it’s constantly trending upwards. The figure in their 2021 report is $4.24 million, it’s a 10% increase from 2019 which was $3.86 million, this increase is largely driven by remote work and the proliferation of ransomware.
The average cost of a data breach globally:
2014: $3.50 million
2015: $3.76 million
2016: $4.00 million
2017: $3.62 million
2018: $3.86 million
2019: $3.92 million
2020: $3.86 million
2021: $4.24 million
The highest surge in costs related to data breaches is found in the health-care sector, at $9.23 million per incident – A $2 million increase since last year.
The hacking arms race
Like in the cold war between the US and the Soviet Union, your defense has to be better than your opponent’s offense. In cyber security the arms race has already been lost, the hackers are usually multiple steps ahead of cyber security professionals.
This was illustrated very well during the SolarWinds hack which was a watershed moment for cyber security. It was one of the largest and most sophisticated attacks of all time, with over 18,000 potentially breached organizations.
The victims were some of the largest technology companies and the most sophisticated U.S. government agencies, including the U.S. Departments of State, Treasury, Defense, and Homeland Security.
The takeaway from all this is that protecting data in an online, connected, environment is all but impossible. All software running on a computer can have unknown vulnerabilities that in time will be found and exploited through the internet.
There is no 100% effective antivirus
Most security solutions, like antivirus, are reactive in their nature, they only react to threats they have been programmed to detect. In many cases a hacker gets past antivirus by only changing small bits of code in old viruses, making them invisible for antivirus software.
This is a cat and mouse game that the mouses are winning.
Another effective way to circumvent protection is purchasing a zero-day vulnerability. This is a software vulnerability unknown to everyone but a few powerful actors that either use or sell them. Since this vulnerability is unknown the exploit can go on years until detected and patched (if ever).
Inproa SDL uses proactive security rather than reactive, our system is built around never having your data connected to the internet. If a hacker can’t see your data it can’t be stolen or even targeted for attempted hacking, this is proactive security at its finest.
The core of the SDL-system is a bare-bones Linux OS (Host) that in turn uses virtualization technology to run two instances of Windows (Guests) on top of it.
The Guests are:
Open Machine, internet-connected environment for daily online tasks.
Secure Machine, isolated from the internet and used for classified information.
The user works with confidential data on the Secure Machine and quickly switches to the Open Machine when there is a need for internet. Working with classified information in an isolated environment that is not connected to the internet is the only way to guarantee a good baseline level of security.
Read more about our Technology.
What is a Hacker?