Log in
E-mail
Password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
Settings
Settings
Dynamic quotes 
OFFON

4-Traders Homepage  >  Equities  >  Nasdaq  >  Cisco Systems    CSCO

CISCO SYSTEMS (CSCO)
Mes dernières consult.
Most popular
  Report  
Real-time Quote. Real-time Cboe BZX - 07/19 05:42:34 pm
42.385 USD   +0.41%
04:57pCISCO : A New School of Learning
PU
04:57pCISCO : See How to Use the Plug and Play API in DNA Center – P..
PU
04:27pREDEFINING DATA : Deliver Effective Workload Protection in a Multicl..
PU
SummaryQuotesChartsNewsAnalysisCalendarCompanyFinancialsConsensusRevisions 
News SummaryMost relevantAll newsofficial PublicationsSector newsTweets

Cisco : Is It Possible to Stop Modern Hackers? A Challenge for Telecom Operators.

share with twitter share with LinkedIn share with facebook
share via e-mail
0
10/06/2017 | 02:20pm CEST

Cisco Blog > SP360: Service Provider

SP360: Service Provider Yves Padrines - October 6, 2017 - 0 Comments

Hackers now work in organised gangs that target individuals to infiltrate organisations. It's hard to stop them - but by taking an integrated approach to security, service providers can stay ahead.

Cyber crime has changed.

At one time, hackers were lone operators breaking into systems to cause mischief. Now they work in organised criminal gangs, on operations worth millions of dollars.

Hackers cleverly pinpoint an organisation's weaknesses to enter networks. Often they do this by targeting specific individuals. Once they've found a way in, they might not be detected for a long time - and they can do a lot of damage while they're there.

software. We can't mention Belgacom anylonger

Spear phishing - how hackers get to know you

A cyber attack that tried to get you to download software or hand over information by sending a fake email is known as a phishing attack. When hackers do this by pretending to be someone you know, it's called spear phishing.

Our video on the Anatomy of an Attack demonstrates how hard it can be to realise you are the victim of this kind of attack.

The woman working for the hacking gang finds out as much as she can about the company. She befriends the CEO's wife on Facebook, and contacts the sales team so she can see the organisation's email signature style.

She then sends an email to staff impersonating the boss. Anyone who downloads the attachment infects their computer with malicious software.

Once hackers have infiltrated a company, they are able to cause devastating problems. In the video, they extract a large ransom payment and release personal information held by the business, causing its stock to fall to an all-time low.

A growing problem

Spear phishing is attractive to hackers, because by finding just one weak spot in the system, they can potentially gain access to highly sensitive information.

The technique has been used for some high profile attacks. The FBI recently said that the 2014 hack on Yahoo that compromised over 500 million user accounts may have begun with a spear phishing email.

And businesses will become even more vulnerable to attacks like this, as everything, both within and outside organisations, becomes more connected. The growing adoption of the cloud and the internet of things gives hackers more and more potential entry points.

And once they've broken through, it's easier for them to reach other parts of the system.

As the video shows, hacking into a network doesn't require anyone to be stupid. All it needs is a small oversight.

Is there anything businesses can do to protect themselves?

Combating threats with an integrated approach

Powerful security products, including firewalls and malware detection, are essential for telecoms companies who want to provide a reliable service. But the best defence comes from taking a holistic approach.

That's why service providers need to rethink the way they combat threats. They need to take a best of breed, architectural approach that enables service providers to deploy security that is simple, open, automated and effective.

All the elements in a security portfolio should also be communicating with each other. And there should be visibility across the system.

Cisco's holistic approach to security

Cisco can provide the technology and expertise to provide you with high-level protection against cyber threats. We have a comprehensive suite of best of breed security products, and can advise you on how to bring them together into an integrated architecture.

And our products are constantly updated with information from Talos, our global security team that maintains a deep understanding of the latest threats around the world. The team has worked with service providers to take down major hacking gangs.

As the success of Talos demonstrates, Cisco's strength lies not just in our cyber security expertise, but in applying that expertise practically to help keep businesses safe.

The approaches used by hackers are always evolving. But by thinking holistically and considering threats at every stage, service providers can stay one step ahead.

Find out how Cisco's holistic approach to security can protect your organisation against modern hackers

To learn more, visit our Security Solutions page for Telecom & Media.

Tags:

Cisco Systems Inc. published this content on 06 October 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 06 October 2017 12:19:04 UTC.

share with twitter share with LinkedIn share with facebook
share via e-mail
0
Latest news on CISCO SYSTEMS
04:57pCISCO : A New School of Learning
PU
04:57pCISCO : See How to Use the Plug and Play API in DNA Center – Part 2
PU
04:27pREDEFINING DATA CENTER SECURITY : Deliver Effective Workload Protection in a Mul..
PU
02:42pVULNERABILITY SPOTLIGHT : Multiple Vulnerabilities in ACD Systems Canvas Draw 4
PU
02:28pCISCO : Custom Computer Specialists Renews Cisco Advanced Collaboration Architec..
AQ
02:12pCISCO : Named Optical Network Market Leader by IHS
PU
02:12pCISCO : A Safe Space – Bring Your Special Kids to Work Day
PU
12:12aCISCO : Moving Towards The Zero Trust Cybersecurity Framework?
PU
07/18CISCO : Engineering the new performance class of hyperconverged infrastructure
PU
07/18CISCO : CompTIA - Security+ Voucher & Cisco - ICND 1 Voucher
AQ
More news
News from SeekingAlpha
09:00aTrouble Ahead For The Shotgun Wedding Of Polycom To Plantronics 
07:35aAmazon Tops $900 Billion In Market Value (Wall Street Breakfast Podcast) 
07:01aWALL STREET BREAKFAST : Race To $1T Market Cap 
07/18Cisco +3.7% on report Amazon denies plans to compete in switches 
07/18CISCO DIVIDEND : By The Numbers 
Financials ($)
Sales 2018 49 258 M
EBIT 2018 15 197 M
Net income 2018 -883 M
Finance 2018 25 613 M
Yield 2018 2,89%
P/E ratio 2018 -
P/E ratio 2019 17,60
EV / Sales 2018 3,52x
EV / Sales 2019 3,51x
Capitalization 199 B
Chart CISCO SYSTEMS
Duration : Period :
Cisco Systems Technical Analysis Chart | CSCO | US17275R1023 | 4-Traders
Technical analysis trends CISCO SYSTEMS
Short TermMid-TermLong Term
TrendsBearishNeutralBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus OUTPERFORM
Number of Analysts 31
Average target price 48,9 $
Spread / Average Target 16%
EPS Revisions
Managers
NameTitle
Charles H. Robbins Chairman & Chief Executive Officer
Tiang Yew Tan Senior Vice President-Operations & Digital
Kelly A. Kramer Chief Financial Officer & Executive Vice President
Guillermo Diaz Chief Information Officer & Senior Vice President
Roderick C. McGeary Independent Director
Sector and Competitors
1st jan.Capitalization (M$)
CISCO SYSTEMS10.21%199 120
QUALCOMM-8.22%87 341
ERICSSON36.19%25 464
ARISTA NETWORKS INC16.60%20 374
MOTOROLA SOLUTIONS36.36%19 853
HARRIS CORPORATION7.41%18 004