Cyber Security Event Series

Can You Trust White Hat Hackers?

1st April 2016admin

The cyber security industry has always relied on hackers to find and reveal vulnerabilities in systems.  Those that do so in a constructive manner, to provide companies with the information they need to patch these vulnerabilities, are known as white hat hackers. But can any hacker truly be trusted?

White hat versus black hat

The difference between white and black hat hackers lies not in their skill sets but in their intentions.  White hat hackers use their skills to breach security systems, just as do their black hat counterparts. However, while black hat hackers act maliciously and frequently engage in harming others for their own personal gain, white hat hackers have different goals.

Essentially, the purpose of a white hat hacker breaching a security system is the ultimate improvement of that system. White hat hackers use their full skill set, which can include everything from breaking and entering, social engineering, and of course, software penetration, to attempt to breach security. Often, their testing takes place without the majority of an organisation being aware that there is a security review taking place.

There are also white hat hackers who engage in penetration testing and attempted security breaches without the knowledge of anyone in an organisation, with the full intention of disclosing their methods for the greater good of the company’s cyber security policies.  However, this is illegal in many regions.

Are white hat hackers trustworthy?

By definition, a white hat hacker is a hacker whose intentions are good and who behaves in an ethical fashion.  However, distinguishing a true white hat hacker from a black hat hacker isn’t always simple. There have been incidents in which a black hat hacker posed as a white hat hacker in order to create a distraction or gain restricted access to a system.

Hackers and cyber security experts are not, in and of themselves, more or less trustworthy than other types of employees and consultants.  However, as with all employees who will be granted special permissions and access to restricted information, it’s critical for companies to choose security consultants that can be trusted.

Carefully looking into the background of any employee or consultant who is to be granted the level of access required to conduct penetration testing or an overall security review is extremely important. The job description “hacker” doesn’t indicate that a person isn’t trustworthy, but careful verification is still required.

Tags: cyber security, hacking, white hat

Related Articles

Wearable Technology Security

Integrating Wearable Tech Into Your Risk Management Strategy

17th March 2016admin
Prevent social engineering

How To Prevent Social Engineering

4th May 2016admin
cloud security

Majority of Managed Security Tools Will Be Cloud-Based By 2020

1st June 2016admin

Recent Posts

  • AI Cyber Security: What You Need to Know
  • Is It Possible To Have A 100% Secure Organisation
  • The 5 Biggest Threats to Corporate IT Security
  • UK Government’s cyber defences are being harmed by lack of skills
  • Is it worth having insurance for data breaches?

Tags

2fa air gapped artificial intelligence bit coins blockchains bug bounties byod cloud storage cybercrime cyber insurance cyber law cyber security Cybersecurity cyber security events data analytics DDoS detection e-commerce encryption GDPR government hacking hardware incident response Internet of Things IoT machine learning managed security management mobile security open source passwords phishing quantum cryptography ransomware security breach security flaws small business social engineering threat based analytics Threat Detection Training wearable technology web access management white hat

Social: EMEA

Facebook
Twitter
LinkedIn

Social: USA

Facebook
Twitter
LinkedIn


Cyber Security Events - Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. Registered Office: Bedford House, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom -- Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW -- Imago Techmedia is a subsidiary of Clarion Events Limited

Privacy & Cookie Policy