Also in this playlist...
This transcript is automatically generated
You very much.
OK so cyber attacks on the US traced to the doorstep of -- Chinese military unit this according to a new report.
Securities permit -- Indian alleging Chinese hackers stole a massive amounts of data.
For more than 140 companies.
-- -- CEO of cyber security firm balloon airline joins us now with the latest.
-- I -- believe this doesn't surprise you but it's really not just China that we should be worried about is it.
No -- actually this is.
-- -- an ongoing thing for both our commercial.
Organizations and the government out there for some time we've been watching.
You know different.
Very advanced organizations.
-- for our data still our intellectual property -- break into systems and sometimes just sit and wait until.
They can get.
Outlook -- control capability or I'm also quite possibly still more information and data to to gain an -- John -- but a united Europe the report and shows that at least China has been doing this since 2006.
But it it seems like it's kind of stamped up as of late right I mean we just showed a chart of just since the beginning of the year the attacks that have been on our major companies so what's happening why now.
Interest clean -- trees I would I would tell you that may have may not have amp up that much and -- -- -- say that it.
Our customers are actually.
-- -- a lot of organizations out there are we spending more time concentration on this issue.
So you know it's it's easy to say that.
All of a sudden we're seeing a lot more.
Extraction of data and a lot more attacks on our systems but I don't necessarily know that's true I think we have.
A more advanced capabilities to monitor and look at these type events now.
OK well right.
They're -- -- similar -- something right or that they're not just -- for kicks.
So what is it now they're going after is -- our power grid is -- our financial institutions and -- what's the goal here for these guys.
The answer to that is yes I mean if you think about it it's a fiscally responsible way to obtain intelligence I mean I can break into -- system and extract data in notes and authoritative source.
-- I don't have to spend the money on research and development I can understand your plans like understand everything that's going on with -- organization.
Without necessarily being part of that organization or maybe -- inhuman not to do so.
OK so that being said ten -- saying that we're more aware of this now.
What can businesses do then to protect themselves other then go act backers.
-- well I would say you know this problem is.
It it's multifaceted meaning that.
You have to -- right people with an organization you really need to spend the time the money -- to really enhance the skills of your organization to understand when these type attacks.
And and these indicators are going on your organization dissing that it has built but it just seems so easy to be behind the eight -- hacker eight -- right these guys are always one step ahead of us I mean.
President Obama at this executive -- order -- out there is that even enough.
-- do it well it's one thing to understand you need to -- for both aptitude and attitude.
-- securities and attitude you have to go with that knowing that it's gonna be a long term issue for your organization to deal with but you also have to understand that.
You have to continually learn.
The weapons change the process change you have to change with.
Yes and we certainly need to start.
Finding agents saying weeks you know get our military involved in this as well -- -- thank you very much.
Think that's part of it in a race so many people don't even have find.
That's very true now and zillion -- hack back I think the US I'm sure I'm sure -- that's letting everybody -- actually and --
Filter by section