The UK's National Cyber Security Centre has issued an alert on the MobileIron remote code execution vulnerability. According to the alert, APT nation state groups and cybercriminals are exploiting this vulnerability to compromise the networks of UK organizations.
As the pandemic continues to unfold, many schools have chosen to conduct classes virtually rather than in-person and school buildings have been left empty for durations longer than ever before. With less staff consistently working on school grounds, it can be easy to miss a potentially costly and time consuming emergency. Situations like a leaking pipe or a malfunctioning freezer can quickly go from a minor issue to a major problem if not dealt with as soon as possible. Without physical eyes on these situations, schools need to consider leaning more heavily on technology that can be their eyes and ears, such as environmental monitoring technologies that can allow administrators to monitor their school at all times, even when they’re not on-site.
Too often, decision-makers overlook the strategic value and potential in replacing outdated radios that severely limit real-time collaboration and emergency preparedness. In truth, security teams can no longer rely on the radio technology that hasn’t changed since the 1990s. These six reasons demonstrate compelling evidence that radios are ill-equipped to provide today’s security teams with the situational intelligence they need in a high-tech world:
Security magazine and its partner for the Top Cybersecurity Leaders, (ISC)², is looking for enterprise information security executives, who have made and continue to make significant contributions in the cybersecurity space to their organizations and/or the enterprise-level information security profession.
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in IT security and information technology. As CISO Cyjax, Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cybersecurity consultant specializing in cyber threat intelligence programs for small, medium and enterprise organizations. In his spare time, he teaches cybersecurity and IT business courses for CompTIA as part of their global faculty and is the lead architect for Cyber Titan, Canada's efforts to encourage the next generation of cyber professionals.
The year 2020 has been a whirlwind of adaptation and change, prompting the phrase “business as usual” to take on a whole new meaning. The Center for Internet Security, Inc. (CIS) has become a leader in supporting both public and private organizations in the COVID era, when many are shifting more of their workforce remote and more of their workloads to the cloud. 2020 also marks a milestone for the Center for Internet Security, as CIS is celebrating its 20th anniversary this month.
The risk level to the global workforce has reached its highest since 2016 according to the findings of the International SOS Risk Outlook 2021. Unsurprisingly, around eight in 190 risk professionals believe the health and security risks faced by the workforce increased in 2020 (specifically for “domestic employees” (85%), “assignees” (81%), “student and faculty” (80%), “business travelers” (79%) and “remote workers” (77%)). Around half believe that this will increase further in 2021.
For organizations experiencing data breaches, the consequences are considerable, especially for security operations. IBM reports that over 25,000 data records are stolen with the average data breach, and costing the targeted company as much as $8.64M per breach in the United States. And it takes on average a staggering 280 days between identifying and containing a data breach (known as the breach cycle). So why is it so hard to fight this digital war, and why is the breach cycle so long?
Stories about cyberattacks and security breaches are popping up more and more frequently in the news and it seems as though no company is immune to the sophisticated strategies hackers use to obtain high value confidential data. These data hacks result in bad PR, lost customer trust, possible fines, and potentially ruined reputations. Needless to say, it should have you questioning whether or not your data is properly protected, and the answer is — it’s probably not.
Among the top threats to businesses are theft of property, theft of data and workplace violence. When it comes to preventing these commonplace scenarios, a fence can be the first step to designing an effective access control program. By starting at the perimeter, entities can create a physical barrier that deters infiltration and denies entry. So, what kind of fencing offers an uncompromising solution? An astute option is a fence classified as high-security. Several factors determine whether a fence is considered high-security, including the material it’s made from, how it’s constructed and the features that the construction enables.