Information manipulation

Is your organization prepared?

Setting the Scene

Powerful megatrends like digitalization are changing the way we conduct business. Information assets are growing exponentially while visibility and control over the created information is reduced. Each organization possesses information assets that are vital to continued operations requiring constant assurance over their integrity. Yet, the current focus of cyber security solutions is alarmingly often only on ICT-systems and networks, the mediating technology, instead of the asset itself. This creates a major vulnerability to an emerging security threat, information manipulation, which can significantly harm your operations by making your core operational information unreliable.

Leading experts in cyber security have acknowledged that organizations are facing a challenge in countering this new form of security threat. The inability of current solutions to detect attacks that use legitimate insider accounts allows perpetrators to wreak havoc over long periods of time, leaving the subject with the realization that they can no longer trust their information assets. ”The bomber will always get through” (Baldwin, S., 1932) . When the perpetrator is already inside of the protective barrier of traditional security solutions, it is an imperative to be able to tell if critical information has been altered.

Consequences of undetected information manipulation and the loss of information’s integrity can be devastating. They vary from operational disruptions through regulatory non-compliance to loss of financial assets or – worst case scenario – the business as a whole and resultant legal liability. Being able to verify information’s integrity is as important a core capability as ensuring its confidentiality and availability. Well-implemented situational picturing capabilities over critical information assets are the key to averting information manipulation in the first place.

The threat of Information manipulation has been acknowledged by many leading global experts


”The next type of attack will involve deletion or manipulation of data as opposed to perhaps stealing it or denying service.”

James Clapper

Former U.S. Director of National Intelligence


”It is about losing the integrity of information, about changing the content of the information, so that we can no longer trust its validity. The deliberate manipulation of data is something I also personally see becoming more of a threat in the near future.”

Jarno Limnéll

Professor of Cyber Security


”Our system – whether it’s in the private sector or for us in the military – is fundamentally founded on the idea of trust of the data we’re looking at.”

Michael Rogers

NSA Director & U.S. Cyber Commander


Would you like to know more about Huginn? Leave us your details and we’ll contact you soon.

Fredrikinkatu 47
00100 Helsinki

Powered by Sparta