The quiet threat: Cyber spies are already in your systems

Special report: Electronic espionage from China and others could be stealing your vital product and business information right now

1 2 3 4 5 6 Page 6
Page 6 of 6

These tools don't look for actual malicious code, but rather patterns of network traffic that resemble that of hackers lurking in your network and taking data, says corporate investigator Gregg. Once Social Security numbers, credit cards, or other file types are seen moving out of your network, alarms not only warn the user but help identify and track where the data is going.

If your company has the resources and the expertise, consider developing your own specialized tools to help thwart attacks. Some experts believe this will become more common as companies find that off-the-shelf software doesn't account for their specific information, information movement, and other needs, nor the often custom-tailored threats against them. In other words, because the threats are often custom-made to get specific information from a specific company, your defenses may need to be customized as well.

Ignorance is not at all bliss
Unfortunately, most companies remain blissfully ignorant of the problem of electronic surveillance, says Gartner's MacDonald, taking false comfort in antivirus software and network scans that continue to show zero infections. They'll remain blissfully ignorant until they stumble upon the fact that they've been compromised and that it's been going on for months.

"Denial works until it doesn't," he says.

This article, "The quiet threat: Cyber spies are already in your systems," was originally published at Follow the latest developments in security at

Copyright © 2010 IDG Communications, Inc.

1 2 3 4 5 6 Page 6
Page 6 of 6
How to choose a low-code development platform