Business Continuity NewsBriefs - February 7, 2018
These NewsBriefs are produced and delivered weekly by Attainium to keep our friends and clients current on topics relating to Business Continuity, Disaster Recovery and Crisis Management.
Cyber Security
February 7, 2018 - Cyber security (or cybersecurity, whichever you prefer) is always in the news due to some kind of breach or another. There's no question that the next breach is probably right around the corner. And with the GDPR deadline fast approaching, organizations are more motivated to ramp up their cybersecurity. Everyone is focused on how to protect their systems and their data. This issue looks at some past issues and some new approaches to the problem.
QUOTE OF THE WEEK
"One of the main cyber-risks is to think they don't exist. The other is to try to treat all potential risk... Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats."
-- Stephane Nappo --
1. Understanding GDPR & What It Means for Cyber Security
On May 25, 2018, the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU. These regulations were designed to create a unified standard for personal data privacy and to simplify the enforcement of data privacy laws throughout all EU countries. What some organizations are surprised to learn is that these regulations go beyond the physical confines of the EU and apply to any organization that collects or holds information on EU citizens.
https://www.bradfordnetworks.com/understanding-gdpr-cyber-security/
2. hat is cyber security? How to build a cyber security strategy
Cyber Security represents the ability to defend against and recover from accidents like hard drive failures or power outages, and from attacks by adversaries. The latter includes everyone from script kiddies to hackers and criminal groups capable of executing advanced persistent threats (APTs), and they pose serious threats to the enterprise.
https://www.csoonline.com/article/3242690/data-protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html
3. The Biggest Cybersecurity Disasters of 2017 So Far
The first six months of 2017 saw an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. By July, there already had been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that's just the beginning. Can we learn from these to help protect us in 2018?
https://heimdalsecurity.com/blog/what-is-ransomware-protection/
4. Three Ways Blockchain Is Revolutionizing Cybersecurity
While banking, finance and real estate are the so-called usual suspects by being ahead of the curve, even industries like education, social media and security are being disrupted by blockchain-powered startups. Blockchain technologies are, after all, the culmination of decades of research and breakthroughs in cryptography and security.
https://www.forbes.com/sites/omribarzilay/2017/08/21/3-ways-blockchain-is-revolutionizing-cybersecurity/
5. Why America's Current Approach to Cybersecurity Is So Dangerous
It's almost impossible these days to avoid media coverage of Russia's role in hacking the 2016 election. So it was in 2015, when news broke that Chinese hackers had breached the U.S. Office of Personnel Management. For the public, it's usually these kinds of incidents that come to mind when they hear the term "cybersecurity." They are complex and costly, and cast doubt on the trustworthiness of our major institutions---from government to banks to the electric grid. Yet multiple surveys show that Americans tend to ignore even the most basic security measures with their own digital devices.
http://www.slate.com/articles/technology/future_tense/2017/03/
why_america_s_current_approach_to_cybersecurity_is_so_dangerous.html
6. Five rules for smarter cyber communications
Executives responsible for cybersecurity need to understand how a good cyber communications function works, and they need to make it a regular part of any conversation related to information security or risk management. While it may seem like this is the last thing a CSO should be thinking about, recent incidents prove that the stakes are way too high for communications planning and response to be delegated entirely to someone outside the security team.
https://www.csoonline.com/article/3232368/business-continuity/5-rules-for-smarter-cyber-communications.html
Copyright (C) 2018 Attainium Corp - All rights reserved.