System(ic) Cyber Fever
Take a glance at the most discussed cybersecurity topics of the week.
Could you trust a hacker?
ZDNet on September 13, 2018
In the fight between cybercrime and defense, there is the lack of security pros to protect companies from cyber threats. As a rule, hackers are young and unaware they are committing a crime. Much work is being done to prevent the kids from breaking the law.
There is a big question of hiring those convicted of ‘dark activities’. Can they be trusted? Is there a risk that they can abuse their new position? One of the solutions is to understand hackers’ motivation, reasons for their crimes, and circumstances. It helps to see smaller details beyond their technical skills.
GDPR breach notification issues
Bank Info Security on September 14, 2018
After the GDPR has come into full effect, the number of data breach reports have quadrupled, i.e., organizations report data breaches more frequently.
Under the General Data Protection Regulation, companies must report a lot of types of breaches to relevant authorities via an online form or via a telephone helpline within 72 hours. However, businesses face some notification issues. Take into account that it’s not 72 working hours, but the clock starts ticking from the very moment you become aware of the breach.
Notifications serve a policy role as they can also come in handy for policymakers to better understand the cybersecurity landscape to enhance it overall.
Protect smart devices from cyber attacks
SCMP on September 17, 2018
Although digital home assistants offer convenience, smart devices provide access to your personal data. The growth in their use has seen the wave of associated cyber risks.
Recently, a couple in the United States noticed that their Amazon Echo home hub had recorded their conversation and then sent it to one of the husband’s contacts. Allegedly, the device had misinterpreted their speech.
Similar incidents connected with the inadequate privacy protection can result in cyber intrusion so that any information in the digital form may be compromised.
How to avoid such risks? Cybersecurity experts recommend to choose smart devices that can be easily and regularly updated, block both incoming and outgoing cyber threats, and install unified threat management (UTM) devices on home and office network gateways.
Weakest links in cybersecurity
ThreatPost on September 14, 2018
Breaches due to third-party vendors has reached epidemic proportions. An attractive target is a weakest or vulnerable link. The ramifications are costly, as the average enterprise pays $1.23 million per incident. The weakest links are:
- shared credentials;
- code or applications;
All of them involve some type of necessary sharing.