Businesses need to do more to protect personal data, users say

ITProPortal | May 16, 2019

Businesses need to do more to protect personal data, users say
What in the world are you people hiding? New research is showing that people believe exposing the secrets they hide on their digital devices would essentially destroy their lives. A privacy breach would mean financial ruin, reputational damage, even losing friends, partners and family members. A fifth believe they'd lose their jobs, as well. In 12 per cent of cases, people have been shutting down social media accounts to stay safe. The research was conducted by cybersecurity firm Kaspersky Lab. Four in ten argue that businesses should do more to safeguard their data from prying eyes, adding that the government isn't doing enough to support the businesses Just a third have strenhtened their passwords, and less than half have up-to-date security protection. “We have become a society built upon digital secrets, with those secrets becoming commoditised and traded on the dark web. There is more that businesses can and should do to help protect their customers – including security solutions that significantly mitigate the risk of a successful attack on their systems, running fully updated software, performing regular security audits, performing penetration testing and ensuring that customer data is secure.

Spotlight

Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.

Related News

DATA SECURITY

SYNNEX Corporation Adds Proofpoint to its Security and Networking Portfolio

SYNNEX | July 22, 2021

A leading provider of distribution, systems design, and integration services for the technology industry, SYNNEX Corporation (NYSE: SNX) has announced its expansion of networking and security portfolio with a leading cybersecurity and compliance company, Proofpoint products and services. Through SYNNEX, resellers can have access to the whole Proofpoint line. They can leverage their combined suite of cloud-based solutions, assisting companies globally to safeguard their data, stop targeted threats, and make their users stronger against cyber attacks and threats. This agreement boosts compliance solutions and SYNNEX's cybersecurity and guarding people on all channels, including web,email, social media cloud, and mobile messaging. Through SYNNEX, many inclusive pre-sales support offerings will be accessible such as bill of materials design, assistance with opportunity qualification, access to complementary training, and proof of concept demonstrations. In addition, the dedicated team in SYNNEX Proofpoint can assist with product management and specialization, marketing, business development, and overall business management. With renewal automation, SYNNEX also offers rewarding financial assistance and incentives. This support is aimed to help clients upsurge their operational efficiencies and successfully grow their dealings in businesses. About SYNNEX Corporation Founded in 1980, SYNNEX Corporation (NYSE: SNX) is a Fortune 200 corporation. It is also a leading provider of systems design and integration services and a comprehensive range of distribution for the technology industry to many enterprises. It operates in several countries throughout South and North America, Asia-Pacific, and Europe

Read More

Operational resource aimed at helping small newsrooms shore-up their cybersecurity practices

prnewswire | October 15, 2020

Today the Global Cyber Alliance (GCA) released the GCA Cybersecurity Toolkit for Journalists at the 2020 Online News Association conference. The toolkit is a free, operational resource aimed at helping journalists, watchdogs, and small newsrooms shore-up their cybersecurity practices. Journalists around the world have long been targets of cyber attacks, whether reporting on crime, politics, or simply being a target for the spread of disinformation. Recent examples include an Angolan journalist reporting on the embezzlement of public funds and two Turkish journalists whose accounts and devices were compromised after reporting on the death of Turkish soldiers in Libya. In order to provide some practical resources to manage these risks, GCA assembled a set of tools that journalists can use to shore up their cyber defenses, protect their devices and data, and help safeguard their online presence.

Read More

Cyberattacks on Critical Infrastructures Witness Sharp Rise During the Pandemic

CISA | June 05, 2020

The coronavirus pandemic has spawned a huge increase in cyberthreats and attacks. While much of this is aimed at consumers, a lot has also targeted companies whose employees must now access critical infrastructure. CISA published a set of cybersecurity best practices for ICS, which the agency acknowledges are important for supporting critical infrastructure and maintaining national security. IT security professionals are much more worried about cyberattacks on critical infrastructure than they are about data breaches in the enterprise. The coronavirus pandemic has spawned a huge increase in cyberthreats and attacks. While much of this is aimed at consumers, a lot has also targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home.But that critical infrastructure, which keeps modern society going even during a pandemic, is seriously under-protected against cyberattacks, say recent reports from cybersecurity companies.“Critical infrastructure” means more than the obvious utility companies, water systems, and transportation networks. In defining essential workers during Covid-19-related lockdowns, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) lists 16 categories of critical infrastructure. Last month, CISA published a set of cybersecurity best practices for ICS, which the agency acknowledges are important for supporting critical infrastructure and maintaining national security. These attacks have been building for some time. A Siemens/Ponemon Institute study last October found that 56% of gas, wind, water and solar utilities around the world had experienced at least one cyberattack within the previous year that caused a shutdown or loss of operation data. Only 42% of respondents — those responsible for OT cybersecurity — said their cyber readiness was high, and only 31% said their readiness to respond to or to contain a breach was high. Smaller organizations were much less confident about their ability to take action. Read more: CISCO'S 6 UNPATCHED INTERNAL SERVERS COMPROMISED Our survey found the more integrated IT, OT, IoT and physical systems are, the greater the degree of security, but because they are so integrated, these systems are more vulnerable to attack. ~ said Carcano Since last year, a growing number of known threat groups have been specifically targeting electric utilities in North America, according to a January report from ICS/OT cybersecurity firm Dragos. In February, IT/OT cybersecurity firm Claroty discovered a new vulnerability related to the notorious Industroyer malware, used in the 2016 attack on the Ukraine power grid. Especially disturbing, the new vulnerability allows a DOS (denial of service) attack against protection relays used in electrical substations. A report Claroty published in March found that a clear majority of IT security professionals are much more worried about cyberattacks on critical infrastructure than they are about data breaches in the enterprise. That’s consistent among respondents in the U.S., the UK, Germany, France and Australia. CISA published a set of cybersecurity best practices for ICS, which the agency acknowledges are important for supporting critical infrastructure and maintaining national security. What’s less consistent is the gloomier outlook U.S. respondents have compared to their international counterparts about how much protection is still needed: more than half say U.S. critical infrastructure is vulnerable to attacks, versus 40% of international respondents. But all respondents agreed that electric power is by far the most vulnerable sector. Although some responses vary between domestic and international cybersecurity pros, “They’re more alike than they are different,” Claroty’s co-founder and chief business development officer Galina Antova, told EE Times. “There are some differences based on the vertical sectors, but even within them, a lot depends on the maturity of the security team. At the end of the day, what counts is the maturity of the security systems that team is implementing. On average, U.S. companies are ahead in the security curve when it comes to awareness and starting the implementation steps.” In the last three years, more companies have become actively engaged in implementing OT cybersecurity, said Antova. Organizational changes that give responsibility for OT security to the chief information security officer will mean that necessary alignments between IT and OT teams happen faster, and these are happening faster in the U.S. than in Europe. However, local legal structures also play a part. For example, in some verticals in Europe, the head of production for certain types of facilities has legal responsibility for the cybersecurity of those facilities, so there are some stricter regulations in Europe compared to the US. The joint survey by OT and IoT cybersecurity company Nozomi Networks and Newsweek Vantage interviewed C-level executives at critical infrastructure companies in North America, Europe, and the Asia/Pacific region. It found that 85% of respondents had experienced security incursions into OT networks. Of those, 36% began as incursions in IT or data systems and 32% were physical incursions into OT systems. Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Read More

Spotlight

Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.