• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Cyber attacks a threat to Scottish businesses

October 22, 2017 by Donald Hoxhaj Leave a Comment

http://www.scotsman.com/business/management/cyber-attacks-a-threat-to-scottish-businesses-1-4566474

Cyber attacks a threat to Scottish businesses

This article talks about the following: Statistics says that over 200, 000 organizations were impacted because of WannaCry attacks in May and this impact has also been felt in many organizations such as Maersk that suffered damages worth £240 million. The reality seems to be that hackers and cyber criminals have been targeting the SMEs, instead of the larger organizations because of the ease of attacks. This is because of lack of understanding and sufficient resources at disposal for small businesses. The first step towards prevention is to modernize the existing systems and train people so that they are aware of the hidden attacks.
Because of the number of SME businesses in Scotland, the threat is real and the government is ensuring proper training and retaining of skill sets too.

It will be interesting to see how things unfold in the future. How will the government support training and development of 348, 045 small businesses in Scotland? How much time will be required to upskill the existing labour force and retrain them to new Cyber Security Skills. It would be a challenging situation considering the growing number of SMEs in Scotland.

Filed Under: Week 08: Social Engineering, Encoding and Encryption Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in