Picture this, a large organization has been hacked, compromising the financial information of millions of people. News headlines detailing similar stories are now frequent, causing the job description of CSO to rapidly expand. In the past, the main responsibility of this role has been managing the physical security of an enterprise. But in today’s dominantly digital world, CSOs must expand their reach to not only monitor tangible risks, but also address the uninsured risks that live in the digital world.
The Equifax breach in particular may prove a game-changer. As a credit reporting agency, the company sits on some of the most sensitive personal data. The breach sent a powerful message: Even the gatekeepers themselves are vulnerable.
The natural trend in the cybersecurity industry is that spending money means you’re more secure; however, this isn’t always the case. While cybersecurity budgets will continue to increase in 2018, they will be increasingly focused on areas that will be most effective.
Legacy systems – hardware and software – can double the risk of a data breach. More than 8,500 organizations have over 50 percent of their computers running an out-of-date version of an internet browser, doubling their risk of attack.
According to new research by Venafi, even though SSH keys provide the highest levels of administrative access, they are routinely untracked, unmanaged and poorly secured.
Global consulting firm Protiviti and the Shared Assessments Program’s annual Vendor Risk Management Benchmark Study finds that a majority (53 percent) of organizations surveyed are likely to exit or change (de-risk) relationships with some vendors due to heightened risk levels. The reason cited most often was fourth-party risk issues and an inability to resolve them.
At least 91 percent of U.S. government websites are failing to perform in at least one key security metric, according to a report from the Information Technology and Innovation Foundation.
Building up trust and increasing positive reinforcement can start to help employees to see security in a different light, and possibly even start to change some minds about the personal benefits of paying close attention to security rules.