Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Microsoft Calls for Governments to Team up on Cybersecurity

4/06/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmzkvmjivnzq2l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0


Greater co-operation is needed over the coming decade as emerging countries dominate online.
Microsoft has renewed calls on governments worldwide to harmonize IT security laws, improve risk management and information sharing and develop cybersecurity norms in a major new report designed to help policymakers planning for the next decade.

Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain, looks ahead to a point in just over a decade’s time where there are 4.7 billion people online, 75% of whom come from emerging economies.

In 2025, Microsoft says, there will be around 50 billion connected devices on the planet, with 80% of internet connections coming from mobile devices and most data either stored in or passing through the cloud.

However, there’ll also be severe strains on a developed world experiencing not only a rapidly ageing population with declining birth rates, but also one producing little more than three million STEM graduates annually – five times fewer than emerging countries.

“The Cyber 2025 Model illustrates that the failure to prepare for these expected demographic shifts, particularly aging populations, can have serious consequences for unprepared countries, including unmanageable public debt increases, high youth unemployment, and social instability,” said Microsoft Security VP Matt Thomlinson.

“It even affects cybersecurity as many more ICT systems are deployed to scale services that countries may lack the technical expertise to manage.”

Redmond is predicting three possible scenarios for 2025.
The first, dubbed “Peak”, is an ideal world in which there is strong collaboration between governments.The second, “Plateau”, is characterized by more protectionist policies and standards and a focus on compliance over security.“This results in regular and pervasive data breaches in developed countries, for example, which in turn leads to reactive regulatory attempts to improve data protection,” the report claims.

The third scenario, “Canyon”, is one of deep isolation where governments set out to control ICT systems, fail to protect IP and where cybersecurity policies are “nationalistic”.

“Cyber attacks plague governments that in turn invest resources in offensive cyber technologies, instead of managing risk to support economic growth,” the report says.

To reach the Peak scenario by 2025, Microsoft lays out several major recommendations for policymakers. These include committing to an open, free internet where “consistent and clear” security and privacy guidelines are created for service providers.

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...