within

now browsing by tag

 
 

China to #Continue #Cybersecurity Drills Within #SCO

TASHKENT(Sputnik) – China wants to further conduct cybersecurity exercises within the Shanghai Cooperation Organisation (SCO), the Regional Anti-Terrorist Structure of Shanghai Cooperation Organization (RATS) of the SCO said Monday in a statement.

“Chao Shijian noted on the need to continue holding cybersecurity drills within the SCO framework,” RATS said in its statement.

Last week, Yevgeniy Sysoyev, the director of RATS SCO, met with the deputy head of the Information Department of the Chinese Ministry of Public Security, Chao Shijian, on the sidelines of a meeting of experts on fight against cybercrime.

Sysoyev stressed that the second joint cybersecurity drills of the SCO countries held in China in December were successful. The first such exercises were held in December 2015.
The SCO was set up in 2001 by the leaders of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. In June last year, the members of the organization formally approved the decision to accept India and Pakistan.

Read More….

advertisement:

The post China to #Continue #Cybersecurity Drills Within #SCO appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

National #cybersecurity #strategy can help #Ireland cement its place as an #infosec #hub within #Europe

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans Something interesting has happened in the past year: the term ‘cybersecurity’ has finally entered the mainstream. Due to a period of global instability and numerous cyberattacks by actors eager to take advantage of the uncertainty wrought by Brexit and Trump, the issue of cybersecurity has never […] View full post on AmIHackerProof.com | Can You Be Hacked?

54% of #security #experts anticipate a successful #cyberattack on their #enterprise within the year

Source: National Cyber Security – Produced By Gregory Evans

54% of #security #experts anticipate a successful #cyberattack on their #enterprise within the year

A successful cyberattack on your enterprise may be imminent, and security experts say many companies aren’t doing enough to protect themselves. Increasingly, risks are coming from within.

Ask a cybersecurity expert or hacker to name the weakest link in any security plan and they will inevitably answer “the people.” Just like everything else, security can’t account for the unpredictability of the human factor. In an enterprise setting, employees will circumvent protocols for the sake of convenience, offer bits of information to strangers because they asked nicely, and generally make a mess of any well-laid enterprise-wide cybersecurity plan.

According to the Cybersecurity Trends 2017 Spotlight Report (PDF), 54% of cybersecurity professionals surveyed anticipate a successful cyberattack on their organization in the next 12 months. Some 40% of those professionals also view the lack of employee awareness as a major obstacle to stronger cybersecurity.

With increases in mobility and the adoption of a BYOD culture in the enterprise, 69% of the surveyed cybersecurity professionals are increasingly concerned about data leakage. Another 64% believe their organizations will have to deal with the download of unsafe applications and the introduction of malware stemming from portable storage devices and the like in the next year.

While workforce mobility and the culture of BYOD certainly produce tremendous benefits for modern enterprises, the technology presents a challenging risk for cybersecurity professionals. The only viable approach to overcoming, or at least mitigating, the human factor is to educate employees and establish a comprehensive policy to govern how personal devices, especially portable storage devices, will be introduced to an enterprise network.

TechRepublic’s premium sister site, Tech Pro Research, offers a ready-made Portable Storage Device Policy to help you regulate and secure usage of portable storage devices to help reduce the risks.

The post 54% of #security #experts anticipate a successful #cyberattack on their #enterprise within the year appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Threats to #cyber security comes from #within- largely

Source: National Cyber Security – Produced By Gregory Evans

Threats to #cyber security comes from #within- largely

Contrary to the belief that cyber threats are perpetrated and orchestrated by ‘unknown hackers’ of the outside world, much of the risk persists within an organisation or those closely associated with it.

The latest PricewaterhouseCoopers (PwC) ‘Global State of Information Security Survey’ has found that staff, service providers, suppliers or business partners are among the biggest cyber risks for Kiwi companies.

According to the Survey, 29.6% of respondents said that current staff were responsible for cyber-attacks in New Zealand.

Of course, in each of the cases, the hacker is ‘Unknown.’

The Unknown Hacker

PwCPartner and Cyber Practice Leader Adrian van Hest said that the ‘Unknown Hacker’ syndrome continues.

“The ‘unknown hacker’ was picked as the largest category responsible for cyber-attacks and that is because attribution is difficult and most companies end up not knowing where or who the attackers are. However, it became clear that people known to the company were also among the biggest threats,” he said.

Mr van Hest said that while the amount invested in cyber security has been on the rise, the number of cost of incidents are also increasing. New business models present different cyber risks and the ongoing uptake of cloud computing and reliance on mobile devices bring new risks, not because the technologies are not safe, but because they require companies to take a different approach to the way they manage cyber security.

Investment in Identity Management

Mr van Hest said that investment in identity management is growing faster overseas because of rising cyber incidents through increased cloud usage.

“Kiwi companies are slightly behind the trend as most of our cyber incidents still seem to occur because of outdated software. However, as more businesses move to the cloud, it is only a matter of time before we face the same risks,” he said.

According to the Report, cyber security is no longer an issue for IT departments but a major problem that cuts across the entire digital society.

“Companies that stay competitive in our digital landscape cannot blindly trust that their businesses and customer data will stay secure. Building and maintaining trust will be the greatest differentiator for New Zealand businesses in our digital society and now is the time to start taking that seriously.”

The global scene

Despite a significant increase in cyber-attacks, many organisations still struggle to comprehend and manage emerging risks in an increasingly complex digital society.

“Executives worldwide acknowledge the increasingly high stakes of cyber insecurity. 40% of survey respondents cited disruption of operations as the biggest consequence of a cyberattack, followed by 39% of respondents who that compromise of sensitive data was the biggest consequence, 32% cited harm to product quality and 22% said harm to human life was the issue,” the Report said.

Yet despite this awareness, many companies at risk of cyberattacks remain unprepared to deal with them. 49% said that they did not have an overall information security strategy; 48% did not have an employee security awareness training programme; and 54% did not have an incident-response process.

The Attack and After

Case studies of non-cyber disasters have shown that cascading events often begin with the loss of power, and many systems are impacted instantaneously or within one day, meaning that there is generally precious little time to address the initial problem before it cascades.

Interdependencies between critical and non-critical networks often go unnoticed until trouble strikes.

Many people worldwide, particularly in Japan, the United States, Germany, the United Kingdom and South Korea, are concerned about cyberattacks from other countries.

Tools for conducting cyberattacks are proliferating worldwide.

Smaller nations are aiming to develop capabilities like those used by larger countries. And the leaking of US National Security Agency (NSA) hacking tools has made highly sophisticated capabilities available to malicious hackers.

The post Threats to #cyber security comes from #within- largely appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity Expert On Russian Sanctions Within Legal Boundaries

Source: National Cyber Security – Produced By Gregory Evans

Cybersecurity Expert On Russian Sanctions Within Legal Boundaries

This week, the Obama administration announced sanctions against Russia after saying it was confident the Russian government interfered in last year’s presidential election. The president expanded an executive order from 2015 adding new powers to retaliate against those who disrupt

The post Cybersecurity Expert On Russian Sanctions Within Legal Boundaries appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Trust Within the Leadership Team – Leadership 360 – Education Week

It is the leader who steers the organization and who can make or break the implementation of a change or requirement by the manner in which they lead it.

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post Trust Within the Leadership Team – Leadership 360 – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Watch out for the enemy within

Source: National Cyber Security – Produced By Gregory Evans

Quick – name a security risk to your business that represents over half of security attacks. Did you think “people inside my business?” Probably not. Yet the 2015 IBM Cyber Security Intelligence Index found that over half of security attacks came from within: 31.5 per cent from malicious insiders and 23.5 per cent from inadvertent actors. And this is no exception; security studies consistently demonstrate that the majority of issues originate within the victim organization. The popular paradigm of the mastermind hacker is misleading – there is an inherent risk in business/partner relationships. Anyone with privileged access to data and IT systems poses a serious threat. It’s called insider risk. And “insiders” means everyone from former employees to current ones to contract workers and business partners. The motivation for an intentional internal attack can range all the way from financial gain to extortion. Cyber security can also be compromised by carelessness – weak passwords and lost devices. There are ways to mitigate. Considering incorporating an insider risk management program, with the following components: Engagement and hiring Have contracts in place that clearly outline your security policies and procedures when hiring employees and engaging contractors. Your contract should also seek explicit […]

The post Watch out for the enemy within appeared first on National Cyber Security.

View full post on National Cyber Security

Rape prevention classes should be mandated within Cleveland schools: Jack Coffey and Kelly Papenfus (Opinion)

A report from the Centers for Disease Control and Prevention states that nearly one in five women in the United States has been raped during her lifetime. The Cleveland Rape Crisis Center reports that women between the ages of 16 and 24 are four times more vulnerable to rape than any other national demographic. Furthermore, victims of sexual assault and violence are at an increased risk of acquiring a litany of mental health issues, ranging from major depressive disorder to post-traumatic stress disorder, and the experience of sexual assault and violence increases the risk of suicide. Read More….

The post Rape prevention classes should be mandated within Cleveland schools: Jack Coffey and Kelly Papenfus (Opinion) appeared first on Dating Scams 101.

View full post on Dating Scams 101

Cybersecurity: Tackling the threat from within

cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads The firewalls, anti-virus software, mail-filters and other digital defences used across the business world are generally looking for external threats. But what if the bad guys are on the inside? What if your own employees are seeking to defraud your company by diverting cash, copying the customer database, or stealing sales leads? More than half of all people seeking to defraud a company are inside the fortress, suggest figures from consultancy PWC’s Global Crime Report. That figure has risen steadily over the past few years, the firm says, adding that it now seems to be younger staff who are spearheading the trend. The same survey also saw a change in the nature of fraud. Now, criminals are as likely to indulge in procurement fraud – making false company purchases, for example – as they are to steal cash or data. Fined billions “Internal fraud is a huge area,” says Laura Hutton of big data specialist SAS, “and it’s one that’s getting increased focus.” This is perhaps because scandals such as the Libor rate fixing have been exposed in recent years. Banks have been fined billions for their part in fixing rates that underpin trillions of pounds […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cybersecurity: Tackling the threat from within appeared first on National Cyber Security.

View full post on National Cyber Security