{"id":214,"date":"2010-08-11T00:00:00","date_gmt":"2010-08-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/11\/its-time-to-be-proactive-on-cybersecurity\/"},"modified":"2021-12-30T11:36:45","modified_gmt":"2021-12-30T11:36:45","slug":"its-time-to-be-proactive-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/11\/its-time-to-be-proactive-on-cybersecurity\/","title":{"rendered":"It\u2019s time to be proactive on cybersecurity"},"content":{"rendered":"<p>In light of recent cyberespionage, the breakup of cybercrime rings, and the threats that sophisticated malware such as Stuxnet present to critical infrastructures, McAfee Labs researchers and industry experts call for a more proactive strategy for fighting cybercrime.  &#8220;Cybercriminals prosper because they have very little reason to fear the consequences,&#8221; said Jeff Green, senior vice president of McAfee Labs.  A new McAfee report, titled &#8220;Security Takes the Offensive,&#8221; is based on strategies compiled by international experts and issues a &#8220;call to arms&#8221; to the security industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditionally, security technology companies and computer users have taken a defensive posture, putting the cyber equivalent of body armor on computers, networks and in the cloud.  The report&#8217;s authors say it is now time to avoid enemy strikes altogether by taking a more aggressive stance, aligning forces and involving law enforcement.<\/p>\n<p>&#8220;As we look at the evolution of risky domains and websites over multiple years, we can&#8217;t avoid the conclusion that the risk keeps increasing in both volume and sophistication,&#8221; said David Marcus, director of security research and communications for McAfee Labs.<\/p>\n<p>Use hacker techniques: Data loss is accelerating at an alarming rate, as there were 222 million records lost in 2009 in the United States alone.<\/p>\n<p>Provide data to help prosecute cybercriminals: A major component for combating spam lies in the hands of ICANN (the Internet Corporation for Assigned Names and Numbers), as it accredits the registrants that sell the domains which cybercriminals use to host malicious sites.<\/p>\n<p>An offensive security practice should involve the entire security industry while incorporating methods that have proven successful.  This includes educating those fighting cybercrime &#8220;on the streets&#8221; to have the latest in malware techniques, bringing tools to the mass population to help identify risky behavior, pointing users to the right contacts to report crimes, and helping to build education and awareness at the kindergarten level through higher education.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=9713&#038;utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-214","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/214\/revisions"}],"predecessor-version":[{"id":2701,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/214\/revisions\/2701"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}