Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Cyber Attacks on News Organizations: ISIS Changes Tactics to Win Mindshare

By Carl Herberger
newsroom_enews
May 12, 2015

As part of its arsenal of battlefield tactics, the Islamic State (ISIS) has added cyber-attacks to its list. By hacking into news organizations throughout the world, the terrorist organization has launched incredibly disruptive attacks in France, the United Kingdom, the United States and Iran, as attempts to eliminate the freedom of the press and manipulate the views shared by the media. Over time, each of these attacks were mitigated. However, these breaches demonstrate a number of key exposures that exist, such as social engineering that helped the hackers place malicious malware, and gave validation to a new battlefield front. Regardless of the fight associated with ISIS, newsrooms are destined to continue as a rich target in future conflicts. 

Is a Large-Scale Newsroom Hack Inevitable?

The reason why newsrooms are a perfect soft-target for cyber criminals is that they yield a large payoff. Success for a newsroom breach hinges on instant availability and by halting the dissemination of information. Newsrooms that cannot provide “breaking” news (or any news for that matter) can lose share and their reputation falters. As a result, this diminished level of reliability can cause their business to decay.

Newsrooms are inherently vulnerable as they do not house strong teams of Information Security personnel, nor do they generally possess the world-class tools and architectures needed to defend against sophisticated cyber-attacks. A typical network security tool newsrooms have is perimeter protection, a technology that is an eroding concept. They need to review the impact of today’s standard application security approaches, such as the growing use of cloud technology that can help protect against top-level attacks such as advanced persistent threats, intrusions, distributed denial of service (DDoS) and other forms of highly technical attacks. To properly defend themselves, newsrooms need to implement a much more robust security fabric with higher levels or processes and security.

Given the confluence of motive, impact and vulnerability, the groundwork has been laid for more attacks to occur with increasingly damaging effects.

Are There Precautions Newsrooms Should Be Taking Now?

As the threat landscape is transforming just as quickly as technological advances in network protection, newsrooms must act quickly to assess their ability to withstand cyberattacks. Implementing the following strategies can help to bolster defenses.

  • Identify the requisite defense technologies that can aid in repelling potential attacks.
  • Secure the necessary resources needed in the event of a long term attack.
  • Establish recovery plans. This is vital if an outage occurs or in the event that news content is manipulated.
  • Implement intelligence functions to alert rising or impending risks.
  • Launch risk review processes and update them as needed.

What are the Short-Term and Long-Term Effects of Newsroom Hacks?

Should attacks on news organizations continue, the likely consequences that can occur if perpetrators successfully execute are three-fold.  In the short-term, you may see the unavailability of news for hours, days, or longer. In the long-term, increased hacker-confidence from achieving a successful cyber attack, as well as altered news reports that impact a new organization’s credibility, are potential risks.

Just recently, hackers sympathetic to ISIS successfully cut the transmission to multiple channels of France’s TV5 Monde and took over their website and social media channels. Despite the short-term impact of the disruption (less than 24 hours), the long-term impact of such a large-scale attack can easily embolden terrorists to strike in a similar fashion using this as a “template” for future attacks. They can then refine the attack methods for even greater effectiveness for more extended periods of time.

In 2013, the Twitter account of the Associated Press was hacked into, and false reports of an explosion in the White House injuring President Obama caused a temporary tumble in the stock market. This is evidence of another core long-term issue that relates to the dangers posed by future attacks – the manipulation of information that resides on media platforms that are viewed as credible sources. Casting false reports on websites or via social media accounts can cause a level of mayhem and endanger those who consume the news through these channels.

Current technology shifts have changed what leaders of news organizations have come to expect from IT, and they have also disrupted many of the commonly accepted security models. These changes have resulted in complications for newsroom security professionals dealing with different operating environments and have also contributed to a loss of visibility to the overall business picture.  News organizations need to have the ability to detect threats with high quality in one location and react to those revelations in all operating environments in real-time. They can then orchestrate changes to the affected systems quickly and universally.

Information is power and newsrooms need to invest in strong protocols and shore up their defenses in order to protect the information they report to the public. Credibility and reliability are mainstays of the media, and it is important to ensure neither is tarnished. The need to secure the network infrastructure of news organizations is paramount, and unfortunately, time is not on their side. 

KEYWORDS: media security reputation security terrorist attack

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Carl Herberger is the Vice President of Security Solutions at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. A recognized information security expert, Herberger draws on his extensive information security background in both the private and public sectors. He began his career in the U.S. Air Force as a computer warfare specialist at the Pentagon and managed critical operational intelligence programs aiding both the National Security Council and Secretary of the Air Force. Herberger founded Allied InfoSecurity and held executive security positions at BarclayCard US, SunGard and Campbell Soup Co.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Soccer Ball Unsplash

    Cyber Attacks on the World Cup: Lessons Learned

    See More
  • electricgrid

    Are Cyber Attacks More than Critical Infrastructure Can C.H.E.W.?

    See More
  • apps_enews

    When Pop Culture Drives Mobile App Development, What Happens to the Security of User Data?

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing