Cyber security predictions 2019: Watch for these four important Canadian privacy reports

IT World Canada | January 03, 2019

Cyber security predictions 2019: Watch for these four important Canadian privacy reports
The cyber security record book has closed on 2018, and what a ghastly year it was. It began with the acknowledgment of the Spectre/Meltdown vulnerabilities and ended with the revelation of an API vulnerability at Facebook and a huge breach at Marriott Hotels’ Starwood chain. In between — and this is only a partial list of publicly-disclosed international issues — a database with some 340 million records belonging to U.S. marketing and data aggregation firm data broker Exactis was discovered open to anyone; Twitter urged all of its more than 330 million users to immediately change their passwords after a bug exposed them in plain text; 150 million users of the food and nutrition application MyFitnessPal were told their usernames, email addresses, and hashed passwords had been stolen; LocalBlox, a personal and business data search service, left a database exposed with 48 million records of detailed personal information on tens of millions of individuals and Ticketfly admitted names, addresses, email addresses and phone numbers connected to approximately 27 million accounts were accessed.

Spotlight

Connie Mastovich is the Sr. Security Compliance Analyst at Reclamere and she will be speaking at InfoSec World 2019. Connie's talk will be about "The Dark Web 2.0: How It Is Evolving, and How Can We Protect Ourselves?" Connie teases her talk and explains how to protect ourselves, our clients, and the information that we handle daily.

Spotlight

Connie Mastovich is the Sr. Security Compliance Analyst at Reclamere and she will be speaking at InfoSec World 2019. Connie's talk will be about "The Dark Web 2.0: How It Is Evolving, and How Can We Protect Ourselves?" Connie teases her talk and explains how to protect ourselves, our clients, and the information that we handle daily.

Related News

DATA SECURITY

Ericom Software continues global expansion using Oracle Cloud infrastructure with key Middle East investments

businesswire | December 22, 2020

Ericom Software, an innovator in Zero Trust cloud online protection arrangements and an individual from the Oracle Partner Network (OPN), today reported a development of its Ericom Global Cloud stage server farm presence in the Middle East to help developing interest for Ericom Shield Remote Browser Isolation (RBI). These ventures grow neighborhood admittance to Ericom's internationally appropriated, multi-occupant cloud stage for all associations in the locale. The pace of cyberattacks utilizing malware intended to misuse internet browser weaknesses has been significantly quickening. These sorts of web and email based assaults utilize zero-day malware installed in the substance of sites to convey ransomware, exfiltrate information, upset tasks, and that's only the tip of the iceberg. Ericom Shield RBI forestalls 100% of online assaults by executing web content in a distant, disengaged cloud - based compartment, sending just safe delivering data to a gadget's program. At the point when clients interface with the sites they are totally protected since no web content is ever executed straightforwardly on their gadgets. Neighborhood Cloud Datacenters Deliver Performance, Availability, and Data Sovereignty Two of the most recent server farms in the Middle East, in Jeddah, Saudi Arabia, and in Dubai, UAE, are conveyed in Oracle's Cloud Infrastructure (OCI), a market-driving stage prepared to do flexibly expanding figure limit and handling to oblige changing information traffic needs. “Ericom’s growing data center footprint in the Middle East is important for a number of reasons,” said Ravi Pather, Ericom Vice President, Europe and Middle East. “Meeting local data residency and sovereignty requirements means that that cloud-based services must retain data and logs in the region. Having multiple Points of Presence (PoPs) also allows us to deliver the performance and resiliency enterprises expect.” About Ericom Software Ericom Software is a leading provider of Zero Trust cloud cybersecurity solutions for secure web and application access that protect organizations from advanced cyberthreats. Leveraging innovative zero trust browser and application isolation technologies, Ericom's cloud and software security solutions enable simple, secure policy-driven access to mission-critical resources without impacting end-user productivity.

Read More

Cyberattack shuts down e-learning for two days in New Palestine

wthr | August 06, 2020

The Community School Corporation of Southern Hancock County was back online Thursday. But a cyberattack on the school district’s internet network prevented remote learning the previous two days in the first week of school. "To be unable to offer that right out of the gate is frustrating, especially frustrating knowing that this was a malicious attack on our system and not something of our own doing,” said Wes Anderson, CSC Southern Hancock County director of school and community relations.

Read More

PAS Global Announces Modular OT Cybersecurity Capabilities

PAS | July 29, 2020

PAS Global, the OT Integrity company, today announced Cyber Integrity™ now includes breakthrough in-product expansion to support industrial organizations as they mature their operational technology (OT) cybersecurity capabilities. The cyber risk for critical infrastructure and process industries is greater than ever as digitalization projects and remote work requirements have expanded the attack surface. Industrial organizations are focusing more on addressing cyber risk but are at different stages of maturity. New modular licensing and deployment options in Cyber Integrity version 7.0 provide flexibility to address specific needs as sites advance their OT cybersecurity maturity:Cyber Integrity – Inventory Management: provides discovery and topology mapping of industrial control system environments down to Level 0 devices with unmatched depth and accuracy without passive network detection limitations and active network polling risks.Cyber Integrity – Vulnerability Management: includes inventory management and enables the identification of vulnerabilities hidden in industrial infrastructure, leveraging and enhancing regular feeds from the United States National Vulnerability Database (NVD).Cyber Integrity – Enterprise: includes inventory and vulnerability & patch management as well as in-depth Level 3 to Level 0 OT asset configuration management with comprehensive cybersecurity configuration baselining, unauthorized configuration change detection, workflow-driven vulnerability remediation and incident response, risk analytics, compliance workflows and reporting, and backup and recovery support.

Read More