How Blockchain Helps Make you More Secure

Peer Mountain
peermountain
Published in
2 min readOct 24, 2017

Automated cyber security has a powerful ally in blockchain applications

Cyber thieves only need to find one way into an organization’s or individual’s server or device, and they have plenty of tools not only to find that solitary point of entry, but also to extract colossal amounts of highly sensitive data.

Anyone searching Google for ‘automated hacking tools’ is immediately offered an array of sites where they can quickly download highly disruptive tools. Many come with user ratings, operator guides and money-back guarantees. They are available to rent, buy, rework or franchise. They appear almost legitimate.

Yet for those hungry for hacking tools, this is just the start. Navigate onto the dark web and you’ll find yourself winding through the digital underworld of cyberspace’s most notorious black market, a Mos Eisley for cyber weapons vendors, creating a booming cyber arms marketplace outside the parameters of the law. Weapons of choice for hackers here tend to be those that dramatically simplify and multiply sophisticated cyber-attacks. These range from automated distributed denial of service (DDoS) ‘Stressor’ tools, which overload networks with reams of data, to dictionary attack tools that generate endless password combinations in a bid to break into private devices.

To battle this far-reaching threat, companies and institutions are looking to automated cyber security solutions.

The cyber security skills gap means we don’t have the people to constantly reinforce cyber defenses. Instead, we can use machines to conduct rapid, detailed and accurate audits.

This enables organisations to free their cyber security teams from firefighting and engage them in strategy, implementation and active defense. How do we know that automated tools can save time, money and resources? The real proof is in the application. The WannaCry ransomware attack in May [2017] led to operations being cancelled in 48 NHS trusts across the UK. Yet those parts of the NHS using intelligent autonomous cyber security ‘audits’ to find system risks were largely unaffected. The autonomously gathered intelligence, used alongside other tools, ensured preventative measures were in place to successfully protect themselves. Finding the right combination of automation tools, in an industry famed for its “smoke and mirrors”, can be its own challenge — but it’s one worth pursuing.

As effective as they may be, intelligent cybersecurity solutions have the potential end up being just another access point for thieves. Savvy enterprises and institutions can fortify their cybersecurity efforts with Peer Mountain, a blockchain application that uses cryptography to allow people and organizations to create and own trusted records that encompasses digital identity, trust relationships, and proof of activities.

Join us in our Telegram group to get all the news first https://t.me/peermountain

--

--

Peer Mountain
peermountain

Own Yourself. The decentralized P2P Trust and Compliance Platform.