The hacking lowdown

Samantha Beaumont’s career in hacking started when she was a teenager, tinkering with circuit boards and portable electronics. Now she’s responsible for assessing the security of some of the world’s biggest companies as an ethical hacker.

Article

Ethical Hacking

Given the spate of corporate computer hacks seen in recent years it’d be easy to associate hacking solely with malicious intent or criminal gain. Not so for Samantha Beaumont, who makes a living out of the practice: “It isn’t just about breaking into systems to cause havoc,” she says. “What hacking is really about is helping people."

As a Security Consultant for one of the world’s largest software companies, Samantha is responsible for assessing – and improving – the cyber security of businesses around the world, working on the smallest web applications to the biggest computer systems. Her modus operandi is simple: to foil a hacker she must think and act like one. She is what is commonly referred to as an ‘ethical hacker’.

“The work I do is a bit like that of a watchmaker,” Samantha says. “A watchmaker is responsible for creating timepieces that people depend on every day, and it’s only the watchmaker with a true understanding of his or her craft that can fix watches or break them into pieces and put them back together again in ways that people hadn’t previously thought about – ways that improve them.”

It is this ability to improve security systems which gives Samantha the conviction that her practice is one of help, not havoc. Cyber security, perhaps more than any other aspect of business, is in a constant state of flux. It calls for repeatedly improved solutions in order to thwart compromise. No sooner has a new solution been implemented than hackers are scrutinising it.

“Too many times have I heard businesses say that a solution isn’t relevant to their system because they’ve never been compromised in that particular way before,” says Samantha. “The fact is, hacking isn’t about doing things that people know; it’s about doing things that people don’t expect or that have never been done before, manipulating systems in ways that previous programmers and administrators would never have thought possible and using their logic against them.”

It’s not a checkbox activity

On the one hand, SMEs have an advantage over larger organisations when it comes to cyber security; their size tends to render them more agile and fluid. This comes with a warning from Samantha, though: “No system is an easy target by design, only by negligence.”

Nowadays, any business with a stake in a security system (i.e. any business reliant on computers and the internet) must necessarily ensure that their cyber security is, as Samantha says, built in and not bolted on. “It can’t be a matter of crossing off boxes on a checklist whenever an assessment period comes around,” she says. “Cyber security absolutely has to be built in, from the ground up.”

This doesn’t mean that buying tools fixes everything, though. “There’s no use buying tools with flashing lights that tick boxes if the humans behind them are in need of basic security training,” says Samantha. “When it comes to cyber security, people are always the weakest points. You can have the most secure system in the world, but that’s no use when the guard manning the gate will let anyone in. One of the best things any SME can therefore do in terms of improving its cyber resilience is to look at its people and make sure they are security savvy – even just on a basic level to begin with.”

Nobody is immune

Cyber security vulnerabilities vary from business to business depending on their foundations and individual systems. That said, Samantha recommends researching the Open Web Application Security Project’s Top Ten – an invaluable reference list and starting point for internal cyber security assessments, detailing the ten most commonly exploited vulnerabilities of web applications.

Building on from that, she advises that businesses begin to consider building in security from every avenue into the business. “People come first,” she says, “but businesses also have networks, cloud storage, hardware, websites. All of these are avenues that need to be secured in order to function safely and securely.”

As this issue’s cover feature highlights, nobody is immune to cyber crime today. Even the most secure systems can crumble against attacking entities putting enough time, focus, determination and energy into breaking them. “This isn’t about likelihood anymore,” says Samantha. “It’s about impacts. We need to be vigilant and relevant, and not just assuming that cyber security can be checked at the end of each day.”

Want to speak with your nearest Business Gateway team?

Your local Business Gateway can offer you free 1:1 advice and online support to help you with anything to do with your business or if you are just thinking about starting up then we can support you with that too.

Fill in the form below and we will get back to you to help.

1. Tell us a bit about your business or idea (such as, sector, stage…) 2. What are your main reasons for contacting us today? 3. Is there anything else we need to know before we contact you?

Enter your postcode

How we use your data

We will use the information you provide to respond to your request, and to provide business advice and support services to you. For more information please view our privacy notice.

You might also be interested in

Video for business

Video content is the marketing tool of the moment. It is a really engaging way of showcasing your business to both existing customers and potential new ones.

General Data Protection Regulation (GDPR)

Get ready for new legislation regarding the collecting, use and storage of data. This tutorial on GDPR will help guide you and your business on how to easily and efficiently ensure you’re compliant.

Cyber resilience

Big or small, businesses are at risk of attacks from cyber criminals. Our tutorial will help protect your business from cyber crime. You’ll learn how to best prevent and cope with criminal activity.