Showing posts with label CYBERSECURITY. Show all posts
Showing posts with label CYBERSECURITY. Show all posts

Wednesday, 10 July 2019

SLIDESHOW: 8 steps to recover quickly (and well) from a data breach by/via @infomgmt

Cyber attacks are happening with increasing regularity, and health organizations need a recovery plan.

This is very useful to have and could be helpful in drawing up for organisations own plan with more detailed information.

Monday, 17 June 2019

The Stanford Cyber Policy Centre report on securing the integrity of future American elections by Michael McFaul via @FSIStanford

The Stanford Cyber Policy Centre released a report (pdf here) late last week that details Russian interference in the 2016 election and makes recommendations on how to secure the integrity of future elections.

I think if you only want to read the summary of recommendations you can go to page 7 in the PDF.

Friday, 24 May 2019

BSA releases new Software Security Framework to guide developers by David Weldon via @infomgmt


Tommy Ross, BSA’s cybersecurity expert, talks with Information Management about the new Framework and how it will impact software development.

I found this interesting and it is always good to have an idea of how things are going to change in the future so you can plan for it now.

Friday, 22 March 2019

SLIDESHOW: 7 emerging data security and risk management trends by David Weldon via @infomgmt

Risk appetite statements, governance frameworks and password-less authentication are among the growing trends that will impact security, privacy and risk leaders, says Gartner.

Some good observations that are definitely worth thinking about.

Friday, 7 December 2018

How better standards can decrease data security spending needs by Anna Johansson via @infomgmt

Recently, standardisation at the highest levels has opened new doors for companies seeking cyber security solutions that don’t cost a fortune and work better than current approaches

Anna makes some good points - chaos with data, systems or interfaces add needless complexity to an organisation that can give areas that could be exploited. You need ordered data with tight controls.

Thursday, 29 November 2018

Tips for protecting your data when losing an employee by Jason Park via @infomgmt

Most employers would be surprised to learn that departing internal employees can pose a much bigger threat to their business’s data security than external hackers.

These are really good guidelines. Some organisations take away access as soon as an employee tenders their resignation or at least limits it - however I would sound a small caution there - if someone is that keen to take a copy of data they will do that BEFORE they resign - so you have to have good auditing and great control over data transfers/data sticks in your office.

Tuesday, 18 September 2018

Key steps to ensure data protection amidst the growth of mobile apps by Nathan Sykes via @infomgmt

As data protection regulations grow and the laws become more stringent, it has also become much more difficult to follow them because of widespread mobile adoption.

Some useful pointers to steer you in the right direction.

Monday, 16 July 2018

5 security strategies that can cripple an organisation by Bret Settle via @infomgmr

In their urgency to address vulnerabilities, many organisations are making critical mistakes—the results of which can mirror data breaches in their lasting, negative impact.

I agree with Bret - it's hard to protect what you were not aware of (like a silo or a system developed by the business), and how do you protect and prevent all sorts of security issues without adequate finance, resources or even adequately trained resource. 

Monday, 18 June 2018

For GDPR late-comers, data mapping, security are key first steps by Steve Weil via @infomgmt

Despite having two years to prepare, and the deadline to do so now past, many organisations are still struggling with how to comply with the data management mandate.

I would add that it is a great time to update or start some form of data management. It is also vital that you remember interfaces and reports - especially their output - in order to make sure that data is handled and deleted effectively across your whole business.

Thursday, 7 June 2018

Digital Transformation 3.0: Enter The IoT Blind Spot by Nadir Izrael via @forbes

Connected devices are everywhere -- in businesses, hospitals, manufacturing plants, power stations, aeroplanes and government buildings. The internet of things (IoT) is taking us through the biggest digital transformation the world has ever seen

The figure of 40% in this article for devices that can't be seen definitely shows that you cannot use IoT effectively in any organisation unless you do all of the infrastructure and basics so that it really is usable. I have visions of all these connected devices that can't be seen - what a catastrophic failure and huge waste of money.

Wednesday, 24 January 2018

The hidden data organisations don’t realise is vulnerable to hackers by Nick Belov via @infomgmt

Long gone are the days of the small cyberattacks carried out by college kids in their garages. Today, organised criminals and professional hackers are developing frequent, debilitating attacks targeted at companies. Businesses now need to accept that a cyberattack is not an “if,” it’s a “when.”

I think this is definitely a time when organisations need to do thorough inventories of their data and make sure that they have everything documented and protected. The one time you don't protect something is the time hackers get through and maybe that is the may to something else.

Monday, 28 August 2017

The 5 top cybersecurity threats for 2017 by David Weldon via @infomgmt

Cyber attacks and data breaches are on the rise this year, thanks in large part to the proliferation of affordable, customisable and accessible tools for cyber criminals, says Accenture.

This is interesting and in some ways gives you a list of what to look out for and avoid.

Saturday, 5 August 2017

7 steps organizations can take to better protect data by Val LeTellier via @infomgmt

The rampant proliferation of easy-to-use hacking tools and number of bad actors willing to deploy them means that everyone needs to 'up their game' to stay safe.

Definitely agree with him - sometimes it feels like a free for all so it is vitally important to be on top of your game.

Wednesday, 5 July 2017

AI, business process automation the hardest skills to find by David Weldon via @infomgmt

The most difficult to acquire talent this summer are IT pros with experience in emerging and growing technology areas, including AI and the Internet of Things.

A good list of areas to try and train and get some experience in.

Monday, 3 July 2017

SLIDESHOW: 10 tips from the HHS on how to boost data security via @infomgmt

Legacy system shortcomings, a lack of trained staff and connectivity issues put healthcare data at especially high risk, a new study reveals.

Interesting list. I think legacy systems is a general cybersecurity problem which needs to be addressed by everyone.