There was a time when the corporate security team was responsible for setting the policies for overall security within an organization including digital. Today, those responsibilities are likely to be separated between a Chief Security Officer (CSO) and a Chief Information Security Officer (CISO). This brings into play the views, opinions, needs and requirements of both the CSO and the CISO and the potential conflict that may ensue.
Data security isn’t just a software issue. It’s far more physical than you think. While the discussions around cybersecurity awareness are primarily centered around workforce awareness, firewalls, passwords and mysterious black boxes, it’s important to note that a staggering amount of security breaches don’t involve logins, passwords or code at all. They involve people, hardware and a deafening lack of preparedness. In the age of all things cyber, are we dropping the ball when it comes to the physical threat?
Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords/PINs across multiple accounts such as email, computer log in, phone passcode, and bank accounts.
When George Finney was studying law at Southern Methodist University, a private university in metropolitan Dallas with 11,649 students (undergrad and graduate), his supervisor made him a “deal of a lifetime,” he says.
Police allege that a fired Chicago Public Schools employee took a personal database of about 70,000 people contained in a CPS private database with her.
Cyber security is the number one new megatrend shaping the industry, according to the Security Industry Association’s (SIA) yearly report defining the major trends and forces at play in the global security industry. By nearly 30 percentage points, industry leaders said cyber security’s impact on physical security solutions was the greatest they were expecting to face in 2019.
Innovations in cloud and mobile technologies have created more opportunities than ever for employees to work remotely, using devices of their choosing. But the flexibility of technology heterogeneity in the workplace isn’t without risk. As data becomes more accessible across a growing range of devices, the attack surface area also grows wider, raising the possibility of a potential data breach.
Are we asking enough questions about cloud security for organizations to make informed risk management decisions? With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report. This begs the question of cloud security.