Victims of Mobile Privacy Invasions Want to Turn Tables on Attackers

Feb 13, 2013 21:46:04Posted by John Skorick, MyAKA Founder & CEO

Victims of Mobile Privacy Invasions Want to Turn Tables on Attackers

Cyber attacks can cause major headaches for businesses, and unfortunately, these types of hacking cases are on the rise. Every day there are news articles that provide advice on how businesses big and small can prevent mobile privacy breaches, but for some company leaders who have already been victimized, playing defense is no longer enough, reports NPR.

Too Slow to Respond
"You can never win a fight, whether in a boxing match or a war, by only taking defensive actions," Dimitri Alperovitch, co-founder of Crowdstrike, a company that helps businesses take on their cyber attackers, told the news source. "If you're standing up and taking blows, the adversary will ultimately hit you hard enough that you fall to the ground and lose the match. You need to hit back."

While some may frown on the idea of "vigilante justice," Greg Hoglund, co-founder of HBGary, a firm similar to Crowdstrike, told the media outlet that being too slow to respond can cause companies to miss the valuable opportunity to "get rid of the attackers and take away their tools and learn where their hideouts are and flush them out." This could not only help a company prevent multiple attacks, but also protect other businesses that would have been targeted by the same hackers had they not been apprehended.

Counterattack Methods
Fighting fire with fire, in terms of cyber attacks, is easier said than done. In many cases, it can be difficult to track down the hackers who caused the breach, meaning that a counterattack could end up wasting company resources without returning results. On top of this, taking independent action to respond to cyber attacks could cause legal trouble.

Aplerovitch, however, told the news source that there are some ways to legally respond to a hacking attempt. "If they're going after [your] negotiation strategy for a business deal you're involved in, one thing you can do is craft a fake negotiation document and feed that to them" to throw them off your track.

Defense Still Matters
The cyber experts interviewed by NPR make a strong case for acting offensively, but it's important to remember that the best way to protect mobile privacy is to stop attacks before they start by acting defensively. There are many ways to do this, according to Fox News. One of the best ways to keep company data private is by educating employees on safe practices when using work-related technology. If employees know how to spot phishing attempts and other hacking methods, then the likelihood that they'll compromise a business's privacy decreases dramatically.

Companies that employ a bring-your-own-device policy must also encourage employees to protect their mobile phones while conducting personal business, as failure to do so could cause a privacy headache for the company. Some firms provide workers with second mobile numbers, which means they'll be able to use one phone line while at the office and another while at home, making it less likely that bad practices on their personal number will affect business data.

Hacking is a reality that companies of all size must deal with. Setting up strong defense systems for protecting online privacy while also going after hackers in a legal, responsible way may be the best plan of action to keep your business's information secure.