Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

We are at war; a cyber war

By Eric Jeffery
cyber-security-freepik-(80327).jpg
September 20, 2021

Over the past decade, we have seen attacks grow at an ever-increasing rate. Not only does the quantity of breaches go up, so too does the damage, including monetary loss. In 2021, the IBM Cost of a Data Breach Survey shows a 10% increase in the average total cost. 


The average total cost of a ransomware breach costs $4.62M versus the average data breach of $4.24M.  Attacks come from all over the world. The most significant attacks are those perpetrated by APT's or Advanced Persistent Threats. 


APT's are either funded by governments or permitted to act through tacit instruction or lack of action. We are in a cyber war, and our leaders must educate themselves, enlist experts, and change our defensive posture to a more realistic stance. Money, alerting and education have not worked, and we must adjust tactics.  


Cyber War


War is "a state of usually open and declared armed hostile conflict between states or nations." Hostility includes damage to infrastructure, government entities, public and private businesses. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. We must acknowledge and understand that a computer attack has the same impact as kinetic damage from bullets, missiles and bombs. Armed is defined as "using or involving a weapon." Computers are weapons, especially when used in the fashion, our adversaries continually utilize them. Based on these definitions and understanding the current state of events around the globe, we are in a cyber war.


Cyberattacks Kill Patients

A woman in Germany died because systems were down at one hospital, and she passed away while being re-routed to another facility. A close friend with heart problems went to a facility for a critical test. After waiting for three months, his appointment was postponed due to a cyberattack at Centura Health in May 2021. Countless other patients suffered lack of care, lack of testing and lack of medicating due to this and other attacks on healthcare institutions. Nuance creates speech and imaging technology for healthcare providers.  When their environment went down during the NotPetya attack in 2017, it impacted numerous clients, including Heritage Valley Health System in Pennsylvania (HVHS). 


During the attack, HVHS "physicians and nurses were forced to re-draw pre-operative laboratory results, laboratories and x-ray machines were down, and some patients had to be diverted to other locations." The death toll from these attacks is unknowable. Cyberattacks impact healthcare and lead to loss of life, directly and indirectly. 


The cyber war claims lives, just not monetary losses.


Infrastructure, including oil and gas, utilities, and transportation, have been pummeled as well as the healthcare industry. In June 2021, a large portion of the eastern seaboard suffered oil supply constraints after Colonial Pipeline was hit with Ransomware. This provider, the largest pipeline in the United States, was forced to shut down its systems before paying a $5M ransom. During this time, they were unable to pump and deliver fuel to customers. This was a direct attack on American infrastructure by foreign threat actors based in Russia. In March 2019, attackers utilized firewall vulnerabilities in grid operators in the Western United States to cause periodic blind spots for grid operators for around 10 hours. In June 2021, threat actors suspected to be sponsored by the Chinese government hacked into the New York City Metropolitan Transit Authority (MTA) and accessed three of the agency's databases. Evidence abounds; we are under attack and in an undeclared cyber war.


Perspectives from Insurers


Insurance firms recently began refusing to pay policyholders after these attacks. Insurer Zurich American refused to pay US food producer Mondelez International Inc. after NotPetya cost the firm ~$100M stating the policy didn't cover an act of war. The pharmaceutical giant Merck suffered ~$1.3B in damage and now has numerous lawsuits in action attempting to recoup money from insurers refusing to pay as the policies didn't cover an "act of war." Private companies acknowledge the war while our leaders don't seem to draw the proper conclusion. Something must change as everything points to an increase in attack frequency and cost.


What's Next


From citizens to elected officials to business leaders, everyone must stop thinking hackers are individuals sitting in a basement breaking into computers. The vast majority of the most severe attacks come directly from nations or state-sponsored actors. Countries directly or through tacit approval use computers in an offensive capacity on a regular and routine basis. They use these systems for reconnaissance, stealing data, vandalizing systems, extortion, and numerous other reasons. Whatever their motives, they pose a clear and present danger to the United States of America, and our Federal Government must wake up and take immediate action.


Author's note: The comments and statements in this article are my own and don't necessarily represent IBM's positions, strategies or opinions.

KEYWORDS: advanced persistent threat cyber security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eric jeffery

Eric Jeffery has nearly 30 years’ information technology experience with over 20 years’ in cybersecurity. Mr. Jeffery currently works as a Sr. Solutions Architect for IBM Security. He has published dozens of articles, presented at numerous conferences, and has a patent filed for a novel cybersecurity defensive maturity model. Mr. Jeffery runs a Podcast under the moniker Cyber Security Grey Beard to help students and early professionals learn, grow and advance in the information security profession. He lives outside of Denver, Colorado with his wife and has four grown children.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber_001-freepik1170x658.jpg

    Firewall hardening – A critical business need

    See More
  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • rackspace-wargames

    Moving to a State of Resiliency: Why War Games Are the Key

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing