Information scraped from about 500 million LinkedIn profiles is available for hackers to buy, on top of a similar incident involving Facebook. Microsoft-owned LinkedIn reports that the information is "an aggregation of data from a number of websites and companies" and not a breach.
IT and cybersecurity are usually in separate departments, but things can get muddled fast in the event of a cyberattack, experts say. Jerry Bessette of Booz Allen Hamilton suggests naming "an overarching crisis management team that's coordinating all the work streams."
Making an enterprise's workforce aware of cybersecurity matters isn't a one-size-fits-all endeavor, writes Perry Carpenter, chief evangelist at KnowBe4. In this commentary, Carpenter outlines best practices and counsels executives "to become ... master storyteller[s] about the value of security awareness in your organization."
The doomsday rhetoric about cybersecurity attacks on public facilities could backfire with the public, says Ciaran Martin, founding head of the UK's National Cyber Security Centre. Martin says analogies evoking "big weapons of war" wind up accidentally conveying to people "that this is something they can't do anything about."
Cybersecurity would be enhanced if hackers were put behind bars, writes Charles Herring, chief technology officer and co-founder of WitFoo. The age of the innocent hacker has passed, Herring notes, and now "[c]riminals must believe punitive action is probable when executing crimes."
Val Cofield of the US FBI's cybersecurity division says women seeking to advance in the cybersecurity field should be unafraid "to ask the questions, to volunteer and try something new." Adds Alexis Wales of the Cybersecurity and Infrastructure Security Agency: "As we collectively work to establish long-term stability and security in cyberspace, our nation's ability to attract, retain, and promote women in the field is vital."
More than a year into the pandemic, organizations that are implementing a hybrid workforce still have many security challenges to account for, with technology, process and culture among three key considerations that help to establish proper boundaries and protocols. Full story: ISACA
One way to mitigate data storage costs is to jettison data your enterprise doesn't need, says Mark Chamberlain of Automatic Data Processing. An even bigger mistake than keeping data you don't need: overpaying to store data that might increase liability.
With its two-wire design, Crestron’s Horizon Thermostat eliminates the need for battery replacement.