Support 100 years of independent journalism.

Advertorial feature by Hacker House
  1. Science & Tech
31 October 2017updated 08 Sep 2021 6:55am

All computers are broken

When it comes to cyber crime, knowing your enemy is the first step to beating them. 

By Jennifer Arcuri

Between the dependency on critical infrastructure, the rise of connected devices, and all the talk of increased cyber attacks, everyone has an interest in cyber security. It’s a rare day where there isn’t some big “hack” that’s cost companies millions in losses, someone’s identity has been stolen, or some indecent exposure has taken place online. This isn’t about weak passwords, out-of-date software, another intrusion detection system, anti-virus, or firewall. Automate and introduce managed services all you want, but at the end of the day, we absolutely need more cyber skill.

Why is this? All computers are broken. Inherently, computers are susceptible to an increasing number of threats, advances in attacking has made cybercrime easier to perform and harder to defend against. Every system can be hacked. There is not a company, network or software that cannot be compromised in some way. It’s time for us to embrace the problem-solving abilities of hacking and embrace it as part of the solution. Knowing how your adversary works and attacks allows for better targeting of resources, models like the cyber kill chain have helped pave the way for companies to better understand their risks.

Isn’t it time we heard from the hackers? Our team has consistently breached security of devices, from the latest “ransomware-proof” computers to “security appliances” meant to prevent advanced attacks. Exploit developers and purveyors of the art of hacking; our team embodies the hacker spirit to show you what your adversary already knows.

One of the biggest reasons companies are failing at security is because they don’t have the right skills on the team. Even if they hired an outside consultant, there is still no guarantee that the “patches” pointed out are now secure and that the company is indeed protected from further attack. The cyber consultancy model is flawed. Companies can’t afford to keep up with the “ask” for security budget if there is no one on the team who can think as an attacker would.

The result is a shift in industry. Hackers are now essential. Companies invest in hackers on their team rather than “wait” to be made a target. These cyber skills are invaluable to the business because it better prepares companies to handle more of their own internal breaches with a better incident response management. Having an on-site resource who can make sense of cyber security and the tools used can be a huge asset.

Select and enter your email address Quick and essential guide to domestic and global politics from the New Statesman's politics team. A weekly newsletter helping you fit together the pieces of the global economic slowdown. The New Statesman’s global affairs newsletter, every Monday and Friday. The New Statesman’s weekly environment email on the politics, business and culture of the climate and nature crises - in your inbox every Thursday. Our weekly culture newsletter – from books and art to pop culture and memes – sent every Friday. A weekly round-up of some of the best articles featured in the most recent issue of the New Statesman, sent each Saturday. A newsletter showcasing the finest writing from the ideas section and the NS archive, covering political ideas, philosophy, criticism and intellectual history - sent every Wednesday. Sign up to receive information regarding NS events, subscription offers & product updates.
  • Administration / Office
  • Arts and Culture
  • Board Member
  • Business / Corporate Services
  • Client / Customer Services
  • Communications
  • Construction, Works, Engineering
  • Education, Curriculum and Teaching
  • Environment, Conservation and NRM
  • Facility / Grounds Management and Maintenance
  • Finance Management
  • Health - Medical and Nursing Management
  • HR, Training and Organisational Development
  • Information and Communications Technology
  • Information Services, Statistics, Records, Archives
  • Infrastructure Management - Transport, Utilities
  • Legal Officers and Practitioners
  • Librarians and Library Management
  • Management
  • Marketing
  • OH&S, Risk Management
  • Operations Management
  • Planning, Policy, Strategy
  • Printing, Design, Publishing, Web
  • Projects, Programs and Advisors
  • Property, Assets and Fleet Management
  • Public Relations and Media
  • Purchasing and Procurement
  • Quality Management
  • Science and Technical Research and Development
  • Security and Law Enforcement
  • Service Delivery
  • Sport and Recreation
  • Travel, Accommodation, Tourism
  • Wellbeing, Community / Social Services
Visit our privacy Policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications.

Hacker House has developed a Hands on Hacking course to give companies those real-world simulations of what happens with their systems are attacked. It is designed to teach skills used by ethical hackers to conduct a variety of assessment activities. Hands on Hacking allows companies to quickly train and scale their security teams. Rather than pay for expensive theory-based content and out-of-date information, companies are looking for real hackers to train their teams to respond to attacks.

The Hands on Hacking course is made up of modules where students are presented a topic and are taught how to launch an attack upon completion of each lesson. The course can be taken in a classroom environment or online through the on-demand portal. Once the course is completed, students retain access to all lab work; a virtual hacking lab is set up for a live 365 environment to hone their skills and better prepare defences for attacks.

Hacker House teaches the core concepts used in many cyber security-related job roles from intelligence analysts to penetration testing. Whatever your job in technology, isn’t it time you learned how to protect yourself?

Click here for more information.

Topics in this article :