enemy

now browsing by tag

 
 

Stop treating users as the enemy when it comes to cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

What are the biggest roadblocks to better cybersecurity? If you look at the major cybersecurity conferences, the usual presentation topics are risk assessment, encryption, zero-day exploits, and insider threats. But there’s no shortage of technical and human challenges to cybersecurity; often these factors are competing against each other for time…

The post Stop treating users as the enemy when it comes to cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Watch out for the enemy within

Source: National Cyber Security – Produced By Gregory Evans

Quick – name a security risk to your business that represents over half of security attacks. Did you think “people inside my business?” Probably not. Yet the 2015 IBM Cyber Security Intelligence Index found that over half of security attacks came from within: 31.5 per cent from malicious insiders and 23.5 per cent from inadvertent actors. And this is no exception; security studies consistently demonstrate that the majority of issues originate within the victim organization. The popular paradigm of the mastermind hacker is misleading – there is an inherent risk in business/partner relationships. Anyone with privileged access to data and IT systems poses a serious threat. It’s called insider risk. And “insiders” means everyone from former employees to current ones to contract workers and business partners. The motivation for an intentional internal attack can range all the way from financial gain to extortion. Cyber security can also be compromised by carelessness – weak passwords and lost devices. There are ways to mitigate. Considering incorporating an insider risk management program, with the following components: Engagement and hiring Have contracts in place that clearly outline your security policies and procedures when hiring employees and engaging contractors. Your contract should also seek explicit […]

The post Watch out for the enemy within appeared first on National Cyber Security.

View full post on National Cyber Security

EX-CIA: CYBER BLACKOUT SHOWS WHAT ENEMY COULD DO

Source: National Cyber Security – Produced By Gregory Evans

While some experts believe there was nothing malicious about the more than three-hour cyber breakdown of the New York Stock Exchange on Thursday, they do not want to admit the system’s vulnerabilities either to the public or the government, because it would undermine consumer confidence and rattle the American economic system, according to Peter Pry. Pry, a former analyst with the Central Intelligence Agency, also warned that if “unintentional” circumstances can cause such a dramatic disruption to the NYSE operations, “imagine what a skilled and well-resourced malicious cyber adversary may be able to accomplish.” Pry also was a staff director of the congressionally mandated Electromagnetic Pulse Commission, which addressed the potential impact of an EMP attack on the nation’s critical infrastructure. He is director of the congressional advisory Task Force on National and Homeland Security and the U.S. Nuclear Strategy Forum. Trading on Wednesday was halted for more than three hours because of what the NYSE’s website described as a software-update problems. The NYSE insisted that the trading blackout wasn’t due to a cyber attack. The blackout, however, occurred at the same time the Chinese stock market lost a third of its value, the European markets were jittery over the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post EX-CIA: CYBER BLACKOUT SHOWS WHAT ENEMY COULD DO appeared first on National Cyber Security.

View full post on National Cyber Security