In a recent issue of Forbes, Joe Lazauskas wrote that “There is no silver bullet when it comes to cyber security…”, and most knowledgeable people in the cyber community would tend to agree with that statement. Until the day comes…if ever…when a truly effective defense is developed, hackers and those who defend our digital networks will continue to play their cat and mouse game.
What we can do in the interim is something we all should have learned back in kindergarten…sharing. Back then we learned to share our paper, glue, and crayons. As we grew we learned to share other things, especially information, and found that sharing in the long run benefited everyone. For example, try to imagine our country if our law enforcement agencies did not share information – it would be extremely difficult to apprehend the ‘bad guys’ as they fled from one jurisdiction to another if the ‘good guys’ did not cooperate and share information. That line of thinking also applies to the digital world and cyber security. If we keep information about breaches to ourselves or do not share relevant information, it will only make the lives of bad actors that much easier. On the other hand if we learn to cooperate and share data it will put at least a crimp in their activities.
The federal government has initiated a sharing program of its own called the Enhanced Cybersecurity Services or ECS that shares key cyber information with all levels of government as well as with the private sector. The Department of Homeland Security is the base for this program. Essentially, DHS compiles all sorts of information on cyber threats from various federal agencies and then…this is the key word…shares that information with approved ECS participants. DHS notes that ” Participation in the program is voluntary and is designed to protect government information, corporate information security, and the privacy of participants, while enhancing the security of critical infrastructure”.
The program is no ‘silver bullet’, but as part of an overall effort to share information to keep hackers at least at bay, it is certainly an important piece of the puzzle.
Lazauskas, J. (2014). The 3 Biggest Cybersecurity Threats Of 2014 — And How The Federal Government Plans To Stop Them.
Department of Homeland Security