Discuss

now browsing by tag

 
 

Cyber security #experts discuss #mitigating #threats, say #universities can #play a key #role in #protecting the #country against a #cyber attack

Former U.S. Director of National Intelligence and Navy Vice Adm. Mike McConnell advocated today for stronger protection of digital data transfers and for universities to play a key role in filling cyber security jobs.

McConnell was among the keynote speakers at the 2018 SEC Academic Conference hosted by Auburn University. The conference, which is ongoing through Tuesday, is focused on the topic of “Cyber Security: A Shared Responsibility” and brings together representatives from the SEC’s 14 member universities along with industry experts in the area of cyber security.

McConnell is encouraging the use of ubiquitous encryption as a solution for stronger data protection.

“As we go to the cloud…ubiquitous encryption of some sort would be used so that if anybody accessed that data, you can’t read it. If you’re moving [the data] from point A to point B, it scrambles so you can’t read it,” he said.

McConnell understands that stronger data security can come at a cost for others, including law enforcement who may need to access data within a device during a criminal investigation.

“What I’m arguing is the greater need for the country is a higher level of [data] security. If that’s the greater need, then some things of lesser need have to be sacrificed. So when I say ubiquitous encryption, that’s what I’m attempting to describe. It is protecting the data that is the very lifeblood of the country,” McConnell said.

McConnell also addressed how academia can help in securing the nation from cyber attacks.

“We have about 300,000 job openings across the United States for which there are no cyber security-skilled people to fill those jobs,” he said. “Universities are debating academically ‘What is cyber security?’ and ‘How do you credit the degrees?’ and ‘How do you get consensus on what it is and what it should do?’”

He urged universities to move more quickly on coming to a consensus so they can get certified and accredited to start producing students who can fill those jobs.

Glenn Gaffney, executive vice president at In-Q-Tel, also spoke to the role higher education institutions can play in cyber security during his keynote address at the conference.

“It is at the university level where we don’t have to take a top-down approach,” Gaffney said, adding that universities can work together, through research and student involvement, to create proactive solutions to cyber security. “This is where the next generation of leaders will be developed. It’s here that these dialogues must begin. This is the opportunity.”

Ray Rothrock, CEO and chairman of RedSeal Inc., was the day’s third speaker, presenting on the topic of “Infrastructure: IoT, Enterprise, Cyber Physical.” Rothrock also held a signing for his new book, “Digital Resilience: Is Your Company Ready for the Next Cyber Threat?”

Attendees at the conference are exploring computer and communication technology; the economic and physical systems that are controlled by technology; and the policies and laws that govern and protect information stored, transmitted and processed with technology.

Students at each SEC member university participated in a Cyber Challenge and presented posters displaying their work in the area of cyber security.

advertisement:

The post Cyber security #experts discuss #mitigating #threats, say #universities can #play a key #role in #protecting the #country against a #cyber attack appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Pacemakers and #patient #monitors can be #hacked in seconds, #San Diego experts discuss #threat

Source: National Cyber Security – Produced By Gregory Evans

 San Diego cyber security expert Ted Harrington with Independent Security Evaluators invited us to his Downtown office to see how quickly and easily he and his colleagues demonstrate successful hacks of modern medical devices. Medical devices like pacemakers and patient monitors are some of the newest vulnerabilities to cyber attack in the healthcare industry.

The threat hits home. According to the California Life Sciences Association, the state has more medical device jobs that anywhere in the nation, with 74,000 employees. A total of 7,700 of them are based in San Diego.

San Diego is a city that’s no stranger to malicious software or “malware” assaults on the medical sector. Last year, the 306-bed Alvarado Medical Center had its computer system affected by what it called a “malware disruption”. The hospital briefly considered doing an on-camera interview with us about the security changes that have been implemented since the incident, but then it backed out.

The hospital spokesperson cited in part, “A careless slip during an interview can reveal possible [vulnerabilities] in our ‘armor’ that a hacker can take advantage of.”

Also last year, nearby Hollywood Presbyterian Medical Center made headlines when it paid a $17,000 ransom to the hacker who froze its computer system for several days.

“Healthcare is attacked more than any other industry because that’s where the money is,” writes prominent cybersecurity company Sophos in its SophosLabs 2018 Malware Forecast report.

A records check on the U.S. Department of Health and Human Services’ Office of Civil Rights website shows a total of thirteen California healthcare facilities that are currently under investigation for reported hacks.

Now, the threat to patient privacy could be challenged by a threat to patient safety.

Harrington and his team connected my finger to a sensor that was attached to a patient monitor. My healthy vitals were displayed on the patient monitor screen and on the screen representing a nurse’s computer.

In a real-world setting, that nurse’s computer would be in a different room from the patient and his or her monitor. 10News Reporter Jennifer Kastner was asked to remove my finger from the sensor, to make it look like she was flat-lining, but Harrington and his team hacked the nurse’s computer in seconds to make the nurse’s computer show that she was still healthy.

He and his team also showed us they could hack a patient’s displayed blood type.

“If the physician thinks the patient is a certain blood type and orders a transfusion of a different blood type, that directly hurts the patient. It would most likely result in a fatality,” says Harrington.

In October, the FBI put out a warning about the growing concern over cyber criminals targeting unsecured “Internet of Things (IoT)” devices, including medical devices like wireless heart monitors and insulin dispensers.

Years ago, it was reported that former Vice President Dick Cheney had his pacemaker altered to prevent an assassination attempt.

“We can’t bury our heads in the sand anymore. These types of medical cybersecurity vulnerabilities are going to become commonplace,” says Dr. Christian Dameff with UC San Diego Emergency Medicine.

Dameff is also a self-described hacker. Despite the FDA’s claim that there aren’t any known cases of patients’ devices getting hacked, Dameff believes attacks have happened and they were likely accidental, but never got reported.

“These devices in our systems are not well equipped to even discover these types of attacks,” he said. “It’s essentially like asking a toaster to figure out if your house has been hacked. They’re just not designed to find out.”

The experts we spoke to want to make it clear that while there’s a threat of cyber attacks on medical devices, the likelihood of it happening to the average patient is low. They urge people to stay mindful of the risks and talk to their healthcare providers about solutions.

The post Pacemakers and #patient #monitors can be #hacked in seconds, #San Diego experts discuss #threat appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

We All Have a Race Problem (and Need to Discuss It) – The Intersection: Culture and Race in Schools – Education Week Teacher

We are all struggling with race. We are all operating in a racist society. Unless we talk about it, we can’t fixing it.

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post We All Have a Race Problem (and Need to Discuss It) – The Intersection: Culture and Race in Schools – Education Week Teacher appeared first on Parent Security Online.

View full post on Parent Security Online

Southwest Florida speakers discuss identity theft at Hodges University

Source: National Cyber Security – Produced By Gregory Evans

The Identity Fraud Institute at Hodges University is hosting an inaugural luncheon to explore the identity theft epidemic and what is being done in Florida from local and national perspective as well as the economic impact to consumers and the State of Florida. Naples Daily News reporter June Fletcher provided live updates from the luncheon. Speakers will include Collier Sheriff Kevin Rambosk; State Rep. Kathleen Passidomo, and Dean Aysegul Timur, Johnson School of Business, Hodges University. Source: http://www.naplesnews.com/news/local-news/live-updates-southwest-florida-speakers-discuss-identity-theft-at-hodges-university

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Southwest Florida speakers discuss identity theft at Hodges University appeared first on National Cyber Security.

View full post on National Cyber Security

India & United States discuss cyber crime and security in dialogue

Source: National Cyber Security – Produced By Gregory Evans

Last week, the United States and India held a joint Cyber Dialogue in Washington, the fourth in the series, led by the U.S. Cybersecurity Coordinator Michael Daniel and India’s Deputy National Security Advisor Arvind Gupta. Other participants in the dialogue included the Department of State Coordinator for Cyber Issues Christopher Painter and the Ministry of External Affairs Joint Secretary for Policy Planning, Counter Terrorism, and Global Cyber Issues Santosh Jha. The delegation discussed cyber issues related to cyber threats, cyber incident management, cybersecurity cooperation, combatting cybercrime, cybersecurity capacity-building, Internet governance and international security. The agencies claim that they will commit to follow up activities to improve the cybersecurity partnership and achieve concrete results. Other than this, the delegates also met with representatives from the private sector to discuss issues related to the digital economy and cybersecurity. The next round of Cyber Dialogue will be held in New Delhi next year. The Whitehouse website currently lists a fact sheet on cybersecurity cooperation with India (pdf), that outlines the initiatives undertaken: – A joint study of the US Federal Information Security Management Act (FISMA) by the US National Institute of Standards and Technology and the Indian Department of Information Technology – The […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post India & United States discuss cyber crime and security in dialogue appeared first on National Cyber Security.

View full post on National Cyber Security

Professors discuss roles in preventing sexual assault

The University of Cincinnati kicked off Women’s History Month Tuesday with a Faculty Against Rape Workshop, an event with the goal of creating conversation surrounding the role faculty plays in preventing sexual assault on campus. The faculty attendance rate, however, was lower than expected. “I was really surprised at the low attendance and believe more faculty should have attended,” said Tiffany Walker, a second-year political science and journalism student. Read More….

The post Professors discuss roles in preventing sexual assault appeared first on Dating Scams 101.

View full post on Dating Scams 101

Gregory Evans Discuss Cell Phone Security On Home & Family Show

Gregory Evans talks cell phone security on the Hallmark Home & Family.  He gives advice that you will never here anywhere else. – Don’t trust cell phone repair people – Viruses and Spyware on cell phones – Hacking Vociemail     View full post on National Cyber Security By Gregory Evans Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Kenya: Regional ICT Ministers Converge in Kenya to Discuss Infrastructure, Cyber-Security and Digital Migration Issues

  ICT ministers from Uganda, Rwanda and South Sudan are meeting in Nairobi to discuss the integration of ICT infrastructure in the East African region. The meeting is expected to discuss among other issues the harmonization of policy regimes among the four countries that utilize especially fiber from Kenya among other crucial infrastructure. Other issues on the table […] View full post on Gregory d. evans