Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

We are at war; a cyber war

By Eric Jeffery
cyber-security-freepik-(80327).jpg
September 20, 2021

Over the past decade, we have seen attacks grow at an ever-increasing rate. Not only does the quantity of breaches go up, so too does the damage, including monetary loss. In 2021, the IBM Cost of a Data Breach Survey shows a 10% increase in the average total cost. 


The average total cost of a ransomware breach costs $4.62M versus the average data breach of $4.24M.  Attacks come from all over the world. The most significant attacks are those perpetrated by APT's or Advanced Persistent Threats. 


APT's are either funded by governments or permitted to act through tacit instruction or lack of action. We are in a cyber war, and our leaders must educate themselves, enlist experts, and change our defensive posture to a more realistic stance. Money, alerting and education have not worked, and we must adjust tactics.  


Cyber War


War is "a state of usually open and declared armed hostile conflict between states or nations." Hostility includes damage to infrastructure, government entities, public and private businesses. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. We must acknowledge and understand that a computer attack has the same impact as kinetic damage from bullets, missiles and bombs. Armed is defined as "using or involving a weapon." Computers are weapons, especially when used in the fashion, our adversaries continually utilize them. Based on these definitions and understanding the current state of events around the globe, we are in a cyber war.


Cyberattacks Kill Patients

A woman in Germany died because systems were down at one hospital, and she passed away while being re-routed to another facility. A close friend with heart problems went to a facility for a critical test. After waiting for three months, his appointment was postponed due to a cyberattack at Centura Health in May 2021. Countless other patients suffered lack of care, lack of testing and lack of medicating due to this and other attacks on healthcare institutions. Nuance creates speech and imaging technology for healthcare providers.  When their environment went down during the NotPetya attack in 2017, it impacted numerous clients, including Heritage Valley Health System in Pennsylvania (HVHS). 


During the attack, HVHS "physicians and nurses were forced to re-draw pre-operative laboratory results, laboratories and x-ray machines were down, and some patients had to be diverted to other locations." The death toll from these attacks is unknowable. Cyberattacks impact healthcare and lead to loss of life, directly and indirectly. 


The cyber war claims lives, just not monetary losses.


Infrastructure, including oil and gas, utilities, and transportation, have been pummeled as well as the healthcare industry. In June 2021, a large portion of the eastern seaboard suffered oil supply constraints after Colonial Pipeline was hit with Ransomware. This provider, the largest pipeline in the United States, was forced to shut down its systems before paying a $5M ransom. During this time, they were unable to pump and deliver fuel to customers. This was a direct attack on American infrastructure by foreign threat actors based in Russia. In March 2019, attackers utilized firewall vulnerabilities in grid operators in the Western United States to cause periodic blind spots for grid operators for around 10 hours. In June 2021, threat actors suspected to be sponsored by the Chinese government hacked into the New York City Metropolitan Transit Authority (MTA) and accessed three of the agency's databases. Evidence abounds; we are under attack and in an undeclared cyber war.


Perspectives from Insurers


Insurance firms recently began refusing to pay policyholders after these attacks. Insurer Zurich American refused to pay US food producer Mondelez International Inc. after NotPetya cost the firm ~$100M stating the policy didn't cover an act of war. The pharmaceutical giant Merck suffered ~$1.3B in damage and now has numerous lawsuits in action attempting to recoup money from insurers refusing to pay as the policies didn't cover an "act of war." Private companies acknowledge the war while our leaders don't seem to draw the proper conclusion. Something must change as everything points to an increase in attack frequency and cost.


What's Next


From citizens to elected officials to business leaders, everyone must stop thinking hackers are individuals sitting in a basement breaking into computers. The vast majority of the most severe attacks come directly from nations or state-sponsored actors. Countries directly or through tacit approval use computers in an offensive capacity on a regular and routine basis. They use these systems for reconnaissance, stealing data, vandalizing systems, extortion, and numerous other reasons. Whatever their motives, they pose a clear and present danger to the United States of America, and our Federal Government must wake up and take immediate action.


Author's note: The comments and statements in this article are my own and don't necessarily represent IBM's positions, strategies or opinions.

KEYWORDS: advanced persistent threat cyber security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eric jeffery

Eric Jeffery has nearly 30 years’ information technology experience with over 20 years’ in cybersecurity. Mr. Jeffery currently works as a Sr. Solutions Architect for IBM Security. He has published dozens of articles, presented at numerous conferences, and has a patent filed for a novel cybersecurity defensive maturity model. Mr. Jeffery runs a Podcast under the moniker Cyber Security Grey Beard to help students and early professionals learn, grow and advance in the information security profession. He lives outside of Denver, Colorado with his wife and has four grown children.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber_001-freepik1170x658.jpg

    Firewall hardening – A critical business need

    See More
  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • rackspace-wargames

    Moving to a State of Resiliency: Why War Games Are the Key

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing