<img src="https://secure.leadforensics.com/23986.png" style="display:none;">
Skip to the main content.

1 min read

Why Data Is The New Oil

Last week, we were delighted to host cyber security expert Jason Hart at the first ‘Make IT Happen’ workshop here at our central London offices.

In a fascinating presentation, Jason uncovered the dark world of the cyber-criminal, reminding us that no individual or business is safe from the threat posed by malicious hackers.

“Data is the new oil,” said Jason, a former ‘ethical hacker’ with over twenty years experience in the digital security industry. ‘It’s being found, extracted, distributed and monetised. Even an individual’s email address can be valuable to the cyber attacker, because it’s linked to your various accounts such as Amazon and Dropbox.”

Jason revealed that since 2013, over five billion pieces of data have been breached – yet this figure only represents the hacks we know about. It’s likely that many, many more go unreported, as companies and individuals are often totally unaware that their information has been compromised.

This year has seen many high-profile hacks, from the malware infection that targeted global networks including the NHS, to the attack on UK Parliamentary email accounts. Jason predicts that by the end of this year, a major company will go out of business due to an attack on its data integrity.

With such a gloomy outlook, what can we do to protect ourselves, whether as individuals or businesses?

“Cybercriminals prey on our ignorance,” said Jason. “To stand any chance of meeting the threat, we need to develop a new mindset, and actually think like the bad guys.

“Accept that it’s impossible to prevent every breach, that it is going to happen, and you’ll find that you will immediately start to think differently. Analyse where your data is, where it’s flowing, exactly what it is you need to protect. If the data is outside the direct control of your business, for example in the cloud, you need to ‘kill’ it by applying cryptographic controls. Crucially, the virtual key that unlocks those controls also needs to be protected and stored separately, in a module you own and manage.”

Further tips from Jason include applying two-factor authentication (for example a combination of a password and a pin number), rather than relying on a single password to access accounts, as well as educating employees, customers and contractors on the vital importance of cyber-security.

Jason’s successful breakfast workshop was the first in a series of free industry events organised by us, featuring a variety of guest speakers. If you’re interested in attending a future workshop please get in touch either via our contact form or by calling me on 020 3737 6021.

Penetration Testing – Just How Secure Is Your Network?

Penetration Testing – Just How Secure Is Your Network? 

As we near closer to 2022, we have seen an unprecedented year of cyberattacks. As per Gov.UK, 39% of businesses report having cyber security breaches...

Read More
The Future of The Workplace and How Cybersecurity Holds The Key

The Future of The Workplace and How Cybersecurity Holds The Key

Recently, video-conferencing firm Zoom has agreed to pay $86m (£61.9m) to settle a class-action privacy lawsuit in the US due to privacy invasion...

Read More
Protecting your Business’ Data this Cyber Monday

Protecting your Business’ Data this Cyber Monday

Whilst Black Friday and Cyber Monday have long since been established as major dates in the US holiday shopping season, they’re rapidly becoming just...

Read More