Cyber Security

2017: The Year in Cyber Security

With 2018 well underway, we thought it was high time we took a look back at how the cyber security landscape changed in 2017.

As we covered in a previous post, 2017 was the year that WannaCry waged a world war and titans of every industry announced devastating security breaches—perhaps to avoid the backlash that Yahoo! faced when it revealed it had kept a major breach under wraps for four years.

The events of 2017 shattered trust. But they also inspired the sharpest minds in tech to take action and develop cyber security methods strong enough to match what we were up against. As we venture into a new year with new cyber security challenges, here are some of the most interesting advances in the field we saw last year.

Governments Got More Security-Savvy

Responsible for sensitive data and subject to budgetary restrictions that often prevent them from obtaining the latest cyber security technology, local governments are especially susceptible to breaches—a vulnerability that Timothy Lee, the City of Los Angeles’ Chief Information Security Officer, worked to patch in 2017.

Lee spearheaded the development of the Integrated Security Operations Center (ISOC). It provides real-time situational awareness through the Threat Intelligence Portal that links 40 city departments, the Multi-State Information Sharing and Analysis Center, the FBI, and the United States Secret Service. As Lee explains, “this partnership is critical to immediate threat resolution, provides early warning to state/federal agencies (to protect other municipalities) and rapid response capabilities.”

The Future of the Self-Driving Car Got Safer

Across the nation, Justin Cappos, a New York University (NYU) Tandon professor, led a project designed to protect a piece of technology that made great strides in 2017: the autonomous automobile.

Cappos teamed up with the University of Michigan Transportation Research Institute (UMTRI) and the Southwest Research Institute (SWRI) to build a cyber security system strong enough to stop self-driving cars from being hacked and driven off the road for ransom.

Cappos’ contribution to cyber security is not a piece of antivirus software. Rather, it’s a way of thinking about software security in vehicles that he hopes will become the industry standard. His model rests on a separation of duties for different parts of the car’s software system and a threshold of signatures, where more than one person will have to sign off on changes to important software functions.

Safeguarding Against Future Threats

These two innovators may have taken on very different projects in 2017, but Lee and Cappos both know that the best time to defend against a cyber security disaster is before it occurs. That’s our philosophy, too.

eMazzanti offers the tools and direction you need to navigate 2018’s uncertain cyber security landscape. Contact us today to schedule a consultation.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Shared Mailbox vs. Regular Mailbox in Microsoft Exchange

Microsoft Exchange provides multiple ways to control email communication in a business. Shared Mailboxes and…

2 days ago

Remote Work Rising: The New<br>Way We’ll Work

Remote working was once a niche specialty, only used by tech-savvy and freelancers. But in…

2 days ago

The Role of Print Servers In<br>An Organization

While we live in a digital age, print is still a staple for many businesses.…

2 days ago

Implementing Anti-Spoofing Rules for Email Protection

Increasingly, email communication is playing a pivotal role in business operations, facilitating collaboration, customer engagement,…

3 days ago

The Comprehensive Benefits of MSP Management for Servers, Exchange, O365, VPN, and Networks

As the digital landscape evolves, businesses of all sizes face the challenge of managing complex…

3 days ago

Cost-Benefit Analysis of On-Premises Network/Server Infrastructure vs. Azure-Based Cloud Infrastructure

In the evolving landscape of information technology, businesses constantly seek the most efficient and cost-effective…

3 days ago