Microsoft | This attack demonstrates the degree to
which cybersecurity has become a shared responsibility between tech
companies and customers. The fact that so many computers remained
vulnerable two months after the release of a patch illustrates this
aspect. As cybercriminals become more sophisticated, there is simply no
way for customers to protect themselves against threats unless they
update their systems. Otherwise they’re literally fighting the problems
of the present with tools from the past. This attack is a powerful
reminder that information technology basics like keeping computers
current and patched are a high responsibility for everyone, and it’s
something every top executive should support.
At the same time, we have a clear understanding of the complexity and
diversity of today’s IT infrastructure, and how updates can be a
formidable practical challenge for many customers. Today, we use robust
testing and analytics to enable rapid updates into IT infrastructure,
and we are dedicated to developing further steps to help ensure security
updates are applied immediately to all IT environments.
Finally, this attack provides yet another example of why the
stockpiling of vulnerabilities by governments is such a problem. This is
an emerging pattern in 2017. We have seen vulnerabilities stored by the
CIA show up on WikiLeaks, and now this vulnerability stolen from the
NSA has affected customers around the world. Repeatedly, exploits in the
hands of governments have leaked into the public domain and caused
widespread damage. An equivalent scenario with conventional weapons
would be the U.S. military having some of its Tomahawk missiles stolen.
And this most recent attack represents a completely unintended but
disconcerting link between the two most serious forms of cybersecurity
threats in the world today – nation-state action and organized criminal
action.
The governments of the world should treat this attack as a wake-up
call. They need to take a different approach and adhere in cyberspace to
the same rules applied to weapons in the physical world. We need
governments to consider the damage to civilians that comes from hoarding
these vulnerabilities and the use of these exploits. This is one reason
we called in February for a new “Digital Geneva Convention”
to govern these issues, including a new requirement for governments to
report vulnerabilities to vendors, rather than stockpile, sell, or
exploit them. And it’s why we’ve pledged our support for defending every
customer everywhere in the face of cyberattacks, regardless of their
nationality. This weekend, whether it’s in London, New York, Moscow,
Delhi, Sao Paulo, or Beijing, we’re putting this principle into action
and working with customers around the world.
0 comments:
Post a Comment