Important

now browsing by tag

 
 

#cybersecurity | #hackerspace | Four Important Steps to Secure the United States 2020 Election

Source: National Cyber Security – Produced By Gregory Evans

It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not take the necessary actions to prevent these attacks until it is too late.

There are many different types of cyberattacks that the U.S. 2020 election could face.

  • Attacks on electronic poll books and registration systems to remove individuals from voter rolls, swap their polling location, or claim they’ve voted when they haven’t.
  • Hacking attacks against election websites that educate the public on voting times, polling locations, and the current status of registrations.
  • Disinformation campaigns that disseminate inaccurate results through election night reporting system attacks.

Preventing these attacks requires clever contingency planning and addressing key issues present in the current systems that voters and their states engage with. This article aims to address these issues.

Upgrade voting machines

The most important step in protecting American elections is securing its voting machines. This is hardly a surprise given that the easiest form of attack to comprehend (and by far the most frightening) is the stealthy introduction of malware into voting machines so that election results are changed without anyone noticing.

The first step (and most important) in this process is giving paperless systems a “paper backup” of every vote, one that is verified by each voter. Without this, there is no way to independently assess whether the digital totals provided by the voting machines are legitimate. While this may seem like a huge step, this is something that the United States has made sizable progress towards achieving, that is, halving the number of paperless machines used before 2017.

In a general sense, most American voting machines pose a security risk just by virtue of their age. At a (Read more…)

Source link

The post #cybersecurity | #hackerspace |<p> Four Important Steps to Secure the United States 2020 Election <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Why Granular SharePoint Backup and Recovery is Important

Source: National Cyber Security – Produced By Gregory Evans “What should I backup?”  “Everything, right?” While that seems like the most obvious answer, it isn’t the most optimal. With data privacy being the central focus of compliance laws like the GDPR, HIPAA, and SOX, both the type of data that can be stored and the […] View full post on AmIHackerProof.com

Cyber #Security #Requires an #Important #Ingredient: #Strong UX

In 1993, Apple hired its first User Experience Architect, Don Norman. Today, Norman is considered to be the father of human-centered design — also known as user experience design.

He even coined the term ‘user experience.’ Norman explains, “I invented the term because I thought human interface and usability were too narrow. I wanted to cover all aspects of the person’s experience with the system including industrial design, graphics, the interface, the physical interaction, and the manual.”

User experience isn’t just important for B2C companies like Apple. It’s equally crucial for B2B products and services, like company software programs. Just as Apple products need to be pleasant and easy-to-use for consumers, B2B software needs to be pleasant and easy-to-use for individual employees.

Standing out for having good UX and UI is also crucial for marketing purposes, since the effectiveness of cyber security tools depends on a customer’s ability and willingness to use them. A cyber security platform has to be both functional and user-friendly to attract customer attention and investor funding in the first place. As Hili Geva, COO of product agency Inkod, points out, “When it comes to UX for cyber security, the challenge is to turn the company solution into the most innovative and competitive cyber security platform.

Read More….

advertisement:

The post Cyber #Security #Requires an #Important #Ingredient: #Strong UX appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity: The #Tech #Companies More #Important than the #FANGs.

Source: National Cyber Security – Produced By Gregory Evans

The products and services provided by the behemoths of the tech industry may seem indispensable, and the most fundamental features of the technological environment, however, there are a group of less glamorous firms that arguably are the necessary foundations of the whole industry: cybersecurity firms.

Cybersecurity is defined as the measures taken to ensure protection against unauthorised or criminal use of electronic data.

The world has become acutely aware in recent years that data is the new oil- and reserves are plentiful and exponentially growing. The amount of data in the digital world is growing so rapidly due to trends such as the ‘internet of things’ and ‘bring your own device’ (BYOD); the enormous amount of devices connected to the internet makes data abundant and cybersecurity a constant war ground.

The main antagonist in the cybersecurity realm is ransomware which is a pernicious software emanating from cryptovirology that poses the threat of making a victim’s data public, or permanently blocking access to it, unless a ransom is paid.

Therefore, as more data is created, more ransomware will inevitably be deployed. The ubiquity of ransomware is debilitating for anyone with data and internet access, but it represents a pot of gold for cybersecurity firms – the mercenaries of the technological age.

The Casualties

Everyone reading this will likely be aware of some large organisation that has been attacked by ransomware during 2017. Ransomware victims range from multinational companies such as Equifax and WPP to state institutions such as the NHS.

One of the most malicious attacks that has been seen was this year’s ‘WannaCry’ attack, which impacted 230,000 computers and 10,000 companies throughout 150 countries.

WannaCry infected 47 NHS hospitals, starkly highlighting the callous nature of these attacks. They are not just against multi-billion dollar institutes that are considered to line the pockets of the top 1%, but are also instigated much like actual warfare and terrorism, with no consideration for the innocence or relevance of its victims.

No sector is immune from cyber attacks and over 20% of institutions in financial services, education, entertainment, media, IT and telecoms have all been targeted recently.

One reason for the rapid increase in attacks is that it is becoming increasingly easy to launch a malware attack due to the ability to hire malware. By having the option to hire malware, criminals can launch attacks online with rented viruses which in turn opens up the battlefield to low-skilled, street criminals as well as highly-educated criminals.

The Figures

The opportunities available to cybersecurity firms are plentiful, providing they have the ability to innovate and stay ahead of the malware. The industry is so dynamic as attackers are constantly evolving and producing more vicious, efficient attacks and providing cybersecurity firms can produce the solutions to these attacks: they are indispensable to helpless victims.

The growth that has already been witnessed in this industry is evidence of the huge future potential for growth: the global cybersecurity market was worth $3.5bn in 2004, $64bn in 2011, $138bn in 2017, and is projected to be worth $232bn by 2022.

Furthermore, the US Bureau of Labor Statistics reports that by 2024 there will be an increase in the demand for cybersecurity staff by 36% – double the demand compared to digital workers in other fields.

The vast increase in demand for workers in cybersecurity corroborates the notion that this industry is on track to being one of the most important and lucrative sectors out there.

The Firms

Fortinet is arguably the market leader in cybersecurity and has a very large, diverse product base which enables it to trade with large and small firms. Its reports from 2017 Q1 showed a 20% increase in revenue and an increase in net income of 410% YTD, taking it to $10.7 million. Fortinet’s expected revenue for the entire year is estimated at $1.77bn.

CyberArk Software primarily focuses on protecting internal digital infrastructure, keeping privileged accounts safe, which includes the most sacred and hence potentially dangerous data.

In essence, if an attack manages to breach an initial firewall, CyberArk’s security will keep the crown jewels safe. CyberArk currently has flat earnings but is debt free and has amassed cash assets of $287m.

Furthermore, CyberArk is one of the pioneering companies in the industry and has an impressive client list of 3,200 and does business with 45% of Fortune 100 companies. Additionally, CyberArk acquired Conjur this year ($42m) which will allow it to expand into other areas of security.

Palo Alto Networks focuses on protecting data infrastructure and sells its products and services to 85 of the Fortune 100 companies. This year adjust EPS rose 32.6% to $0.61 and the 3Q revenue report showed a record of $432m, as well as gaining the second highest number of new customers since the business began.

Going Forward

It is clear that the growth potential for cybersecurity is enormous. In fact, some might even say that it is terrifying how dependent society will be on this industry in the near future. People must also not approach cybersecurity in a myopic sense and assume that it only has applications for large firms that have the capital to pay high-price ransoms.

The futuristic phrase of ‘cyberwarfare’ may seem reserved for the cinema screens, however, if hackers sitting in their bedrooms can wreak havoc on some of the biggest institutions in the world, imagine what a government-funded group of experienced, ruthless ‘cyber soldiers’ could do. Less than 10 countries have nuclear capabilities but any country with an internet connection could have access to cyber arms.

Conclusion

Finishing on a more positive note, cybersecurity is currently one of the most highly paid careers in technology with 39% of its employees earning more than £87,000 and 75% earning more than £47,000.

In the past, one would have to risk their lives for almost no remuneration to complete patriotic duty. Now, one can fulfil this moral craving whilst sitting at home, rather than in a dilapidated barracks.

The post Cybersecurity: The #Tech #Companies More #Important than the #FANGs. appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Artificial #Intelligence is #Important for #Cybersecurity, But It’s Not #Enough

Source: National Cyber Security – Produced By Gregory Evans

The advent of Artificial Intelligence has brought with it a new scope for cybersecurity. Why the artificial intelligence is important for cybersecurity?

The advent of Artificial Intelligence has brought with it a new scope for cybersecurity. After all, an intelligent security system is expected to overcome any sophisticated threats. However, many security experts believe that AI is a double-edged sword and hence it could become dangerous at an epic level if it gets into the wrong hands. Let us make a quick analysis on the unison between cybersecurity and AI.

Cybersecurity is the need of the day. As if we didn’t have enough to worry about with terrorists running wild – always looking to inflict damage – we now have to worry about Cybercriminals as well. And in many cases, they can be a lot more dangerous than your average terrorist.

The significance of having a perfect cybersecurity strategy or solution has grown over the years. All the credit goes to the proliferation of smart devices on the Internet. Also, because of the growing endpoints that are always connected to the cyberspace, cybercriminals now have a plethora of opportunities to infiltrate devices.

Not only do hackers have more entry points to breach, but they also have more sophisticated tools to penetrate even into highly-secured devices or networks. How are they doing it? By mass producing sophisticated malware.

According to the 22nd threat report by Symantec, it is found that over 300 million malware were detected in 2016 alone. Not only this! John – the contributor at thebestvpn, shared the shocking statistic that one in every 131 emails contains a malware. The massive figure presents quite a shocking blow to businesses who then rush to come up with a more potent cybersecurity solution.

Moreover, we can’t ignore the fact that with the passage of time, cybercriminals have become smarter and more adept at countering traditional security practices. A survey conducted in 2017 of 70 professional hackers and pen testers found that 60% of hackers claim they can compromise a system within just 6 hours. Plus, over 80% of the hackers and testers said they could remain hidden from the network for 100 days after stealing sensitive data.

To combat such threats, we need to come up with a disruptive security technology that is not only efficient, but also proactive, faster and more intelligent. One such disruption that can prove itself an ideal security solution is Artificial Intelligence (AI).

Artificial Intelligence & Cybersecurity: A Perfect Unison or a Calamity

When we talk about Artificial Intelligence, the first thing that pops into our mind are technologies like Tesla’s self-driving cars or the Amazon Echo. This is because we take AI only as a “Buzzword” and nothing else.

Regardless, AI can offer more firepower when it comes to cybersecurity. It can cover the lack of manpower that we see in this highly complex field. Likewise, it can run things faster and hence detect threats before they could compromise a system and inflict damage.

Although there is a lot of potential in Artificial Intelligence for tackling complex cyber threats for good, there are some aspects that make it a double-edged sword. Before we move on to the other aspects of AI, let’s take a look at why it seems to be a great cybersecurity tool.

The Significance of AI as a Security Solution

IT experts at a company have a lot on their hands to monitor and analyze. They are always challenged with sifting through loads of security logs and activities, finding security threats that could pose a serious threat and coming up with mitigation strategies to contain it.

Moreover, there are weeks and months of logs that need to be scrutinized and vetted for security purposes. Identifying any abnormality in such vast amount of data and then formulating the right solution require not only more manpower but also more tools and resources.

However, an AI-powered machine can greatly assist IT personnel in monitoring, tracking and detecting anomalies efficiently.

Ryan Permeh, Cylance Chief Scientist, said in an online interview conducted by CSOOnline, “Historically, an AV researcher might see 10,000 viruses in a career.  Today there are over 700,000 per day.” He further states that his security firm uses AI to tackle such attacks.

Apart from that, AI as a security tool can help with the lack of manpower that the cybersecurity industry is currently facing. Over 40% of organizations claim that they suffer from a “problematic shortage” of talent in cybersecurity.

Shahid Shah, the CEO of Netspective Communications, claims that there is a lot of skill shortage in different cybersecurity areas such as advanced malware prevention, compliance, IDS/IPS, identity and access management, etc.

Shah further states that by implementing AI, security firms can depend on “computers to do the grunt work and leave humans to the decision-making.”

Why AI Currently Isn’t a ‘Perfect’ Cybersecurity Solution

If AI can be used to shield our systems or networks from cyber-attacks, it is rational to expect the technology being used for more attacks. Shortly, when AI becomes more automated and developed, we might see more sophisticated cyber-attacks carried out by intelligent malware or viruses.

In fact, Endgame’s security expert, Hyrum Anderson has proved just that at the DEF CON 2017. The team demonstrated an intelligent application that can re-engineer a malware and make it undetectable to even a smart antivirus. A group of researchers was successful in circumventing the protective layers of the AI-powered antivirus with its AI-powered malware 16% of the time.

The research was conducted to show that even AI can have blind spots that could be used to compromise systems.

The demonstration Hyrum Anderson presented isn’t the only research that indicates the negative implications of relying solely on AI. In fact, another research conducted by a security firm, Cylance, predicts AI “weaponization” soon.

According to the research, 62% of security experts believe that AI-powered cyber-attacks will increase in the near future, and hence the technology will be used as an intelligent cyber weapon.

“While AI may be the best hope for slowing the tide of cyberattacks and breaches, it may also create more advanced attacker tactics in the short-term,” says Cylance.

Final Say

AI-powered systems may reinforce our cybersecurity infrastructure, enabling our workforce to detect, contain, mitigate or stop cyber threats. However, relying solely on an intelligent technology that could be molded at our will can be dangerous. Plus, an AI-enabled attack may prove to be detrimental at an epidemic level.

The post Artificial #Intelligence is #Important for #Cybersecurity, But It’s Not #Enough appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Arizona dad teaches 9-year-old son important lesson about bullying

It’s a moment every parent dreads: the day their child comes home from school in tears, explaining that a student at school bullied them.

That’s exactly what happened to 9-year-old Bodi Irvine from Gilbert, Arizona, last week.

When the young boy’s father, Isaac, heard what happened, he was furious — but he also used it as an opportunity to teach his son, and other children like him, an important lesson. Now his message is going viral.

“You got bullied today, huh?” Isaac asked his son in a Facebook video, which has been viewed nearly 60,000 times. “What happened? You want to talk about it?

Read More

The post Arizona dad teaches 9-year-old son important lesson about bullying appeared first on Parent Security Online.

View full post on Parent Security Online

Why cybersecurity should be important to hospitals

Source: National Cyber Security – Produced By Gregory Evans The rise of digitization in healthcare, heavily fueled in the U.S. in recent years by incentives of the outgoing administration, has brought an unintended and treacherous side-effect: vulnerability to the increasingly rampant hacking of healthcare data. Hackers have found numerous … The post Why cybersecurity should […]

The post Why cybersecurity should be important to hospitals appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

Trump wants to use couriers for important messages because “no computer is safe”

Source: National Cyber Security – Produced By Gregory Evans

Trump wants to use couriers for important messages because “no computer is safe”

Apart from his apparent love of Twitter, President-elect Donald Trump isn’t a huge fan of technology. Speaking last week about the Russian hacking incidents, the Republican blamed computers for complicating people’s lives. Now, he’s suggested a method of keeping sensitive

The post Trump wants to use couriers for important messages because “no computer is safe” appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Minister of Transports say Cyber security in maritime, oil and gas field important for Cyprus

Source: National Cyber Security – Produced By Gregory Evans

The government of Cyprus is recognising the importance of the effective implementation of a national cyber-security strategy, said the Minster of Transports, Communications and Works Marios Dementriades in his speech in the second CypBER Maritime -Oil&Gas International Conference in Nicosia. As he said the Ministry of Communications and Works which has the supervisory role in the Information Society and Cyber Security fields in Cyprus, is working with the other competent Ministries of the Republic in improving security standards in the country. “The national Cybersecurity strategy covers further to network and information security and resilience, the fields of cybercrime, cyber defence and international cooperation in the field of cybersecurit”, he said, adding that the activities are coordinated by the Office of the Commissioner of Electronic Communications and Postal Regulation. The Minister also said that in a country like Cyprus, where the economy depends heavily on the supply of services and where the successful exploitation of the opportunities from oil and natural gas exploration is evident, a high level of network and information security and cybersecurity, is important, and will contribute to the development of the required market environment and trust, to enable the progress of the society. “The active implementation of […]

The post Minister of Transports say Cyber security in maritime, oil and gas field important for Cyprus appeared first on National Cyber Security.

View full post on National Cyber Security

23 Martial Arts Masters Reveal the Most Important Teachings of the Self-Defense Arts, Part One

The external lessons of the martial arts are obvious. Use a jab to strike an opponent in front of you. Practice kata to polish your basic techniques and movements. Lift weights to build your strength. You probably know them by heart because you’re exposed to them every day in the dojo. Read More….

The post 23 Martial Arts Masters Reveal the Most Important Teachings of the Self-Defense Arts, Part One appeared first on Dating Scams 101.

View full post on Dating Scams 101