Every 40 seconds, a company gets hit by ransomware !

European Centre for Information Policy and Security ECIPS Internship Programme 2018 2017’s Biggest Cyber Attack

The biggest cyber-attacks from WannaCry to Petya and Fireball, could have all been avoided with Desktop Central!

Petya Skype Fireball Delta Charlie WannaCry

May 12th, 2017 witnessed the biggest ever cyber-attack in the Internet history. A ransomware named WannaCry stormed through the network. It targeted computers running Windows OS that are not up-to-date and brought computer systems from Russia to China and the US to their knees.

With a new ransomware being unleashed everyday, enterprises have finally realized the need for an effective tool to secure their endpoints. Desktop Central is an integrated desktop and mobile device management software that allows you to automatically patch Windows, Mac and Linux endpoints and perform various other operations to secure your network against cyber attacks.Are you sure that every word will come to you? The information will be lost in a series of binary codes infected with a new “digital DNA”. What is the price of that?

Business, money, stock market, schedule in the sea or in the sky, where all these figures are traded, to which stock exchanges, to one or more people, to whom they serve, to political, humane or otherwise unknown purposes. Instead of waves, we surf in an insufficiently tested area where there are no randomly selected ones.Why then we are persistently fighting for new technologies, when we cannot reach them when they hurt us to the point our destruction?

Where is the patchy dot in the Pandora’s box? Who can press ENTER and make sure that zero and one arrive correctly in the right place ?\

People also ask:

Is cyber security the same as information security?
What is major in cyber security?
Why does Cyber Security exist?
What is involved in cyber security?

Where is the answer? How to organize the system that we have built against ourselves? How do we defend against ourselves?

The whole thing is to observe and support a system that in theory, should be the tidiest system of binary codes. Physics teaches us that the tidiest state in nature is the state of chaos.

Technology is going to control itself and be ruined by an individual or a group of people who will not use it any more. Have we not learned anything from ancient civilizations that disappeared at the height of their power?

When we reach the peak of a techno-cultural civilization, we destroy ourselves for the power of a different form. How much will it be then, in whose hands will the information be, who will rule the universe, stock exchanges, machinery, and land?

Can the one who provides information attack the same information?Are innovators and protectors the same people who destroy information? The system known by a lot of people, by those who create it, and by those who protect it, but nevertheless, information still leaks. If the system can be protected, why are there holes which grow bigger every day? It is more dangerous to the market after the impact, when the consequences are inconceivable, and the information slowly takes the role of a false leader while the world crumbles.

Who is better, a man or a machine? And when will the machines be smarter than humans?
When the interests of one powerful group cease to be a challenge and a satisfaction in the acquisition of power, something greater than cyber-attacks will arise. Some new binary codes will cause chaos to the internet. The question is whether mankind will endure or no longer exist. Will the digital world destroy and create itself for itself, for the sake of perhaps creating human kind somewhere again?Then our story starts from the beginning.

By Angelina Lazarevic
European Centre for Information Policy and Security
ECIPS Internship Programme 2018,

Management Consulting For Global Risk Is What We Do !

Post Tagged with , ,

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close