Five

now browsing by tag

 
 

From #denial to #opportunity – The five #stage #cyber security #journey

From #denial to #opportunity – The five #stage #cyber security #journey

The digital economy is brimming with commercial opportunity for those that embrace new technologies and innovative business models.

Regrettably, one sector which has been quick off the mark to grasp the opportunity is the criminal community.

Cybercrime is already more common than traditional criminal offences. The global outbreaks of WannaCry and Petya earlier this year showed the astonishing speed and scale at which even unsophisticated attacks can spread and underlined how ill-prepared even some big organisations are to protect themselves from criminal cyber activity.

Progress lies in accepting that cyber security is not a single destination but a complex journey. Broadly speaking, there are five stages along the way.

Stage One: Denial – ‘there is no threat’. The hard truth is that all organisations face low-level cyber threats every day, even if they don’t realise it. Criminals don’t only target big business but increasingly go after SMEs and individuals, soft targets that can provide a pathway into more valuable hunting ground.

Every business is a target and must put in place the basics – after all, standard software updates would have defeated WannaCry at first contact.

Stage Two: Worry – ‘let’s spend on the latest security systems and solutions’. The immediate reaction from the board is to throw money at the problem, along with the appointment of a Chief Information Security Officer (CISO).

However, technology isn’t necessarily the priority. Because the weakest link is often human, education is a priority. Once people understand how they fit into the big picture, they can protect themselves and the company, and become a major line of defence.

Stage three: False confidence – ‘we’re sorted, bring it on’ There is no 100 per cent protection against cybercrime. For example, criminals are now turning their attention to the supply chain, where contractors could unwittingly unlock access to their client organisations. Then there is ‘whaling’, a highly targeted form of phishing aimed at impersonating senior people and use their identity to undertake fraudulent financial transactions.

The way to combat false confidence is to relook at policies, question assumptions and investments, and identify emerging risks and issues. Consider all possible scenarios – ransomware (would you pay a ransom, and how?), data breaches, distributed denial of service attacks, sabotage and fraud. Now is the time to plan and prepare for incidents and practise your responses.

Stage Four: Hard lessons – ‘there’s no such thing as absolute security’. Even the best prepared and protected will still experience a security breach. Perhaps new security solutions are a poor fit with the existing IT infrastructure, leaving vulnerable gaps. On balance, it’s better to go with a security product that’s only 80 per cent right, but works with what you already have and employees can use easily.

This is a good point to consider cyber security insurance. The act of choosing/buying a policy will prompt you to think through potential weaknesses and, if the worst happens, you’ll have access to expert help and the resources you need to get the business back on track.

Stage Five: True leadership – ‘we can’t do this alone’. True leaders will accept that this is how the digital world is, and set out to share information and collaborate with their peers to make it ever harder for criminals to succeed.

The cold reality is that every organisation is a target. The best defence is not what you buy but how you behave. And businesses which treat cyber security not a destination but as a journey will be strongly positioned to protect themselves in the evolving digital economy.

View full post on National Cyber Security Ventures

Five #Fundamental #Strategies for #Cybersecurity

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans Agencies should focus on the basics to protect against attacks. The government’s effort to balance cybersecurity with continued innovation was underscored last year with the publication of the Commission on Enhancing National Cybersecurity’s Report on Securing and Growing the Digital Economy. The report included key recommendations for […] View full post on AmIHackerProof.com | Can You Be Hacked?

Three out of five #Americans concerned #hackers could #spy on them via their #webcam

Source: National Cyber Security – Produced By Gregory Evans

Three out of five Americans concerned hackers could spy on them via their webcam

Avast solutions help users control who can access their webcam to prevent unwanted spying.

In October, we conducted an online survey around webcam security awareness and found that 61% of Americans are concerned hackers could spy on them through their computer’s camera.

They have every reason to be concerned.

Tools that can hack a computer’s webcam are available on the regular web, as well as the darknet, in some cases even for free. Although many computers come with a light that indicates the webcam has been activated, tools can circumvent the light from being triggered.

The survey reveals that Americans are more aware that hackers can spy on them without activating their webcam’s indicator light compared to the global results. Globally, two in every five (40%) respondents are unaware of the threat, while two-thirds of Americans claim they know of the possibility.

Many people, like former FBI Director, James Comey, and Facebook CEO, Mark Zuckerburg, cover their webcam to prevent unwanted spies from watching them. However, despite concerns being high, only 52 percent of Americans have physically covered up their computer’s webcam.

Covering webcams is a good start, but can be an inconvenience if you frequently need to use your webcam. We at Avast understand this inconvenience, which is why we give our users complete control over who can use their camera, without having to physically cover it up. – Ondrej Vlcek, CTO of Avast

Avast’s new feature, Avast Webcam Shield, which comes with Avast Premier, ends webcam spying for good by blocking malware and untrusted apps from hijacking webcams. Furthermore, users have the option of forcing all apps to ask their permission before they can access the computer’s webcam. The same feature is offered in AVG Internet Security, under a different name, Webcam Protection.

Source:

The post Three out of five #Americans concerned #hackers could #spy on them via their #webcam appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Five arrested by cybercrime officers investigating Tunbridge Wells hacking

Source: National Cyber Security – Produced By Gregory Evans

A cybercrime investigation by specialist officers has led to five arrests. The Kent and Essex Serious Crime Directorate has been investigating the alleged hacking of a Tunbridge Wells company in April. The hacking resulted in one of its clients paying £25,000 to a third party after receiving a fraudulent email….

The post Five arrested by cybercrime officers investigating Tunbridge Wells hacking appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Five cool things happening for National Cyber Security Awareness Month

Source: National Cyber Security – Produced By Gregory Evans

National Cyber Security Awareness Month (NCSAM) is in full swing. The month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks. The Equifax data breach, WannaCry ransomware and Petya/NotPetya attacks have dominated the news headlines. So, where…

The post Five cool things happening for National Cyber Security Awareness Month appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Five Reasons Hackers are Targeting SMEs

Source: National Cyber Security – Produced By Gregory Evans

Five Reasons Hackers are Targeting SMEs

Larger organizations dominate the headlines when it comes to cyber-crime, but it is the small and medium-sized enterprises that are becoming the primary targets and are bearing the brunt of most attacks. Smaller businesses are being hit with seven million cyber-attacks a year, which is costing the UK economy an…

The post Five Reasons Hackers are Targeting SMEs appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Five arrested in Georgia for identity theft

Five arrested in Georgia for identity theftSource: National Cyber Security – Produced By Gregory Evans Five people have been arrested in the Georgian capital of Tbilisi and the city of Gori today for identity theft and fraudulent activities. The officers of the division for the fight against cybercrime under the central criminal police department as a result of operative-searching and investigative […] View full post on AmIHackerProof.com | Can You Be Hacked?

Five reasons to worry about the ShadowBrokers hack

Source: National Cyber Security – Produced By Gregory Evans

WikiLeaks is getting headlines with its CIA documents, but leaks from the ShadowBrokers on possible National Security Agency hacking tools may be far more consequential. Since August, the group has been dropping apparent NSA hacking tools, outing NSA operations and …

The post Five reasons to worry about the ShadowBrokers hack appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

LGBT Students: Five Possible Effects of Trump’s Presidency, Ed. Secretary Choice – Rules for Engagement – Education Week

How will Donald Trump’s stances on education, which stress a scaled back federal role, and the appointment of voucher advocate Betsy DeVos as education secretary affect LGBT students?

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post LGBT Students: Five Possible Effects of Trump’s Presidency, Ed. Secretary Choice – Rules for Engagement – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Victim of identity theft racks up five criminal convictions

identitytheft1

Source: National Cyber Security – Produced By Gregory Evans

Victim of identity theft racks up five criminal convictions

A McAllen man will have his criminal record cleaned up after authorities discovered he didn’t actually commit the crimes.
Hidalgo County District Attorney Ricardo Rodriguez filed the motion for expungement last week. It states that from 1997-1999, a man falsely

The post Victim of identity theft racks up five criminal convictions appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures