Network Security and Privacy

KEVIN P. KALINICH |

article image
The digital revolution raises new cyber risk concerns that can significantly affect an entity’s financial statements.Because corporate directors and officers have a fiduciary duty to protect their company’s assets—including digital assets themselves as well as the stock prices that may be affected should a breach occur—they have a legal obligation to focus on IT security and risk mitigation matters.Paying attention to cyber risks is good business. Responsible corporate leaders will focus on, and devote resources to, effective programs to manage information security matters. They will mitigate their risk by engaging experts to place specialized cyber insurance coverage, with language tailored to address their specific needs and exposures.

Spotlight

Emircom

For nearly 3 decades Emircom has been the ICT Partner of choice for many of the most challenging projects in UAE And KSA. Backed by a team of highly qualified professionals, a powerful vision, and a strong management, Emircom is poised to take its rightful place as trendsetters in pursuit of excellence..

OTHER ARTICLES

5 Benefits of Investing in Cyber Security & IT solutions in 2021

Article | June 2, 2021

Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that cyber-attacks can affect the most solid of businesses and create PR nightmares for brands built painstakingly over the years. Investing in cyber security training, cyber security advisory services and the right kind of IT support products, has therefore, become imperative in 2021. Investing in cyber security infrastructure, cyber security certification for employees and IT solutions safeguards businesses from a whole spectrum of security risks, ransomware, spyware, and adware. Ransomware refers to malicious software that bars users from accessing their computer system, whereas adware is a computer virus that is one of the most common methods of infecting a computer system with a virus. Spyware spies on you and your business activities while extracting useful information. Add social engineering, security breaches and compromises to your network security into the mix, and you have a lethal cocktail.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 2, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | June 2, 2021

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

The British government thinks process sensor cyber issues are real – what about everyone else

Article | June 2, 2021

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

Spotlight

Emircom

For nearly 3 decades Emircom has been the ICT Partner of choice for many of the most challenging projects in UAE And KSA. Backed by a team of highly qualified professionals, a powerful vision, and a strong management, Emircom is poised to take its rightful place as trendsetters in pursuit of excellence..

Events