Following media reports that the US has issued an emergency order after revealing that its treasury and commerce departments had been hacked, please see the response below from cybersecurity expert

Following media reports that the US has issued an emergency order after revealing that its treasury and commerce departments had been hacked, please see the response below from cybersecurity expert
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
The growing list of significant breaches underlines the fact that cybercrime knows no boundaries and everyone must be diligent, now more than ever.
While details of this incident are still emerging, a major security theme of this year has been vulnerabilities in leading perimeter security platforms – particularly those used to facilitate secure remote access for the instant army of remote workers the COVID-19 crisis presented us with. As a result of fast implementation and scaling, patches and upgrades for these are taking far too long, and this problem appears to be getting worse. State-backed and criminal hackers have noted this opportunity and pivoted dramatically to explore it, with devastating effect. Several major compromises and breaches exploited vulnerabilities in security products, including ransomware attacks, and these vulnerabilities are a popular constant in state-backed hackers’ arsenals.
We return again to the fundamental question of how we deal with a new world where hacking is big business and we are up against some pretty smart and well-motivated adversaries. Firstly, it is important to get the basics right. Unfortunately, the most determined and motivated attacker will keep probing until they do discover a weakness. We have seen that commercial hackers can be as sophisticated and skilled as state-sponsored adversaries. There is one crucial difference, however. A state adversary is often resource and time-constrained while a commercial adversary is only constrained by economics. Economics which currently makes hacking very attractive and lucrative.
It is also important not just to rely on technology but also to rely on business processes. We believe that the traditionally separate worlds of cybersecurity and fraud need to work together much closer as we realise that cybersecurity is not just a technical issue but an organisational issue.”