Cyber attacks are happening with increasing regularity, and health organizations need a recovery plan.
This is very useful to have and could be helpful in drawing up for organisations own plan with more detailed information.
This is a blog containing data related news and information that I find interesting or relevant. Links are given to original sites containing source information for which I can take no responsibility. Any opinion expressed is my own.
Showing posts with label CYBERSECURITY. Show all posts
Showing posts with label CYBERSECURITY. Show all posts
Wednesday, 10 July 2019
Monday, 17 June 2019
The Stanford Cyber Policy Centre report on securing the integrity of future American elections by Michael McFaul via @FSIStanford
The Stanford Cyber Policy Centre released a report (pdf here) late last week that details Russian interference in the 2016 election and makes recommendations on how to secure the integrity of future elections.
I think if you only want to read the summary of recommendations you can go to page 7 in the PDF.
I think if you only want to read the summary of recommendations you can go to page 7 in the PDF.
Friday, 24 May 2019
BSA releases new Software Security Framework to guide developers by David Weldon via @infomgmt
Tommy Ross, BSA’s cybersecurity expert, talks with Information Management about the new Framework and how it will impact software development.
I found this interesting and it is always good to have an idea of how things are going to change in the future so you can plan for it now.
Friday, 22 March 2019
SLIDESHOW: 7 emerging data security and risk management trends by David Weldon via @infomgmt
Risk appetite statements, governance frameworks and password-less authentication are among the growing trends that will impact security, privacy and risk leaders, says Gartner.
Some good observations that are definitely worth thinking about.
Some good observations that are definitely worth thinking about.
Friday, 7 December 2018
How better standards can decrease data security spending needs by Anna Johansson via @infomgmt
Recently, standardisation at the highest levels has opened new doors for companies seeking cyber security solutions that don’t cost a fortune and work better than current approaches
Anna makes some good points - chaos with data, systems or interfaces add needless complexity to an organisation that can give areas that could be exploited. You need ordered data with tight controls.
Anna makes some good points - chaos with data, systems or interfaces add needless complexity to an organisation that can give areas that could be exploited. You need ordered data with tight controls.
Thursday, 29 November 2018
Tips for protecting your data when losing an employee by Jason Park via @infomgmt
Most employers would be surprised to learn that departing internal employees can pose a much bigger threat to their business’s data security than external hackers.
These are really good guidelines. Some organisations take away access as soon as an employee tenders their resignation or at least limits it - however I would sound a small caution there - if someone is that keen to take a copy of data they will do that BEFORE they resign - so you have to have good auditing and great control over data transfers/data sticks in your office.
These are really good guidelines. Some organisations take away access as soon as an employee tenders their resignation or at least limits it - however I would sound a small caution there - if someone is that keen to take a copy of data they will do that BEFORE they resign - so you have to have good auditing and great control over data transfers/data sticks in your office.
Tuesday, 18 September 2018
Key steps to ensure data protection amidst the growth of mobile apps by Nathan Sykes via @infomgmt
As data protection regulations grow and the laws become more stringent, it has also become much more difficult to follow them because of widespread mobile adoption.
Some useful pointers to steer you in the right direction.
Some useful pointers to steer you in the right direction.
Monday, 16 July 2018
5 security strategies that can cripple an organisation by Bret Settle via @infomgmr
In their urgency to address vulnerabilities, many organisations are making critical mistakes—the results of which can mirror data breaches in their lasting, negative impact.
I agree with Bret - it's hard to protect what you were not aware of (like a silo or a system developed by the business), and how do you protect and prevent all sorts of security issues without adequate finance, resources or even adequately trained resource.
I agree with Bret - it's hard to protect what you were not aware of (like a silo or a system developed by the business), and how do you protect and prevent all sorts of security issues without adequate finance, resources or even adequately trained resource.
Monday, 18 June 2018
For GDPR late-comers, data mapping, security are key first steps by Steve Weil via @infomgmt
Despite having two years to prepare, and the deadline to do so now past, many organisations are still struggling with how to comply with the data management mandate.
I would add that it is a great time to update or start some form of data management. It is also vital that you remember interfaces and reports - especially their output - in order to make sure that data is handled and deleted effectively across your whole business.
I would add that it is a great time to update or start some form of data management. It is also vital that you remember interfaces and reports - especially their output - in order to make sure that data is handled and deleted effectively across your whole business.
Thursday, 7 June 2018
Digital Transformation 3.0: Enter The IoT Blind Spot by Nadir Izrael via @forbes
Connected devices are everywhere -- in businesses, hospitals, manufacturing plants, power stations, aeroplanes and government buildings. The internet of things (IoT) is taking us through the biggest digital transformation the world has ever seen
The figure of 40% in this article for devices that can't be seen definitely shows that you cannot use IoT effectively in any organisation unless you do all of the infrastructure and basics so that it really is usable. I have visions of all these connected devices that can't be seen - what a catastrophic failure and huge waste of money.
The figure of 40% in this article for devices that can't be seen definitely shows that you cannot use IoT effectively in any organisation unless you do all of the infrastructure and basics so that it really is usable. I have visions of all these connected devices that can't be seen - what a catastrophic failure and huge waste of money.
Wednesday, 24 January 2018
The hidden data organisations don’t realise is vulnerable to hackers by Nick Belov via @infomgmt
Long gone are the days of the small cyberattacks carried out by college kids in their garages. Today, organised criminals and professional hackers are developing frequent, debilitating attacks targeted at companies. Businesses now need to accept that a cyberattack is not an “if,” it’s a “when.”
I think this is definitely a time when organisations need to do thorough inventories of their data and make sure that they have everything documented and protected. The one time you don't protect something is the time hackers get through and maybe that is the may to something else.
I think this is definitely a time when organisations need to do thorough inventories of their data and make sure that they have everything documented and protected. The one time you don't protect something is the time hackers get through and maybe that is the may to something else.
Monday, 28 August 2017
The 5 top cybersecurity threats for 2017 by David Weldon via @infomgmt
Cyber attacks and data breaches are on the rise this year, thanks in large part to the proliferation of affordable, customisable and accessible tools for cyber criminals, says Accenture.
This is interesting and in some ways gives you a list of what to look out for and avoid.
This is interesting and in some ways gives you a list of what to look out for and avoid.
Saturday, 5 August 2017
7 steps organizations can take to better protect data by Val LeTellier via @infomgmt
The rampant proliferation of easy-to-use hacking tools and number of bad actors willing to deploy them means that everyone needs to 'up their game' to stay safe.
Definitely agree with him - sometimes it feels like a free for all so it is vitally important to be on top of your game.
Definitely agree with him - sometimes it feels like a free for all so it is vitally important to be on top of your game.
Wednesday, 5 July 2017
AI, business process automation the hardest skills to find by David Weldon via @infomgmt
The most difficult to acquire talent this summer are IT pros with experience in emerging and growing technology areas, including AI and the Internet of Things.
A good list of areas to try and train and get some experience in.
A good list of areas to try and train and get some experience in.
Monday, 3 July 2017
SLIDESHOW: 10 tips from the HHS on how to boost data security via @infomgmt
Legacy system shortcomings, a lack of trained staff and connectivity issues put healthcare data at especially high risk, a new study reveals.
Interesting list. I think legacy systems is a general cybersecurity problem which needs to be addressed by everyone.
Interesting list. I think legacy systems is a general cybersecurity problem which needs to be addressed by everyone.
Subscribe to:
Posts (Atom)