Information Security
171 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT
Scoop.it!

Top 6 vulnerabilities found via penetration tests - GCN.com

Top 6 vulnerabilities found via penetration tests - GCN.com | Information Security | Scoop.it
Top 6 vulnerabilities found via penetration tests
GCN.com
With Microsoft's recent withdrawal of support for Windows XP, the company will stop issuing patches to fix vulnerabilities found in the operating system, leaving XP a prime target for attack.
Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT's insight:

Cyberadversaries are compromising and exploiting your critical data daily for profit and other reasons.  You must know your adversary's modus operandi before you can counter it.  Read!  Act!


more...
No comment yet.
Scooped by Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT
Scoop.it!

In Cybersecurity, Sometimes the Weakest Link Is a Family Member - New York Times (blog)

In Cybersecurity, Sometimes the Weakest Link Is a Family Member - New York Times (blog) | Information Security | Scoop.it
In Cybersecurity, Sometimes the Weakest Link Is a Family Member
New York Times (blog)
Since I started writing about cybersecurity, I've developed something of a reputation for paranoia.
Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT's insight:

This premise is no different than the notion that employees can pose threats to your information privacy. You have to provide your family members with the situational awareness and training so that they can safely operate on the Internet.  They must know that the pair of eyes peering back at them from the darkness of cyberspace is not always friendly. 

more...
No comment yet.
Scooped by Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT
Scoop.it!

Businesses risk data breaches due to 'confusion' over privileged users - Computing

Businesses risk data breaches due to 'confusion' over privileged users - Computing | Information Security | Scoop.it
Computing Businesses risk data breaches due to 'confusion' over privileged users Computing That's according to "Privilege User Abuse & The Insider Threat", a new report from Ponemon Institute, commissioned by defence contractor Raytheon, which...
Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT's insight:

What insider threats do "privileged users" pose to your critical data? Do they have a "need-to-know" or a "want-to-have" reason for accessing your critical data?  Firms need to reassess who has access to their most critical data regardless of position or status. 

more...
No comment yet.
Scooped by Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT
Scoop.it!

Survey Says Mexican Firms Are Vulnerable to Cyber Attacks - Nearshore Americas

Survey Says Mexican Firms Are Vulnerable to Cyber Attacks - Nearshore Americas | Information Security | Scoop.it
Survey Says Mexican Firms Are Vulnerable to Cyber Attacks
Nearshore Americas
Nearly half of Mexican companies suffer minor or large-scale cyber attacks, according to a survey conducted by global business consultancy firm Earnest and Young.
Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT's insight:

Monterrey, MX and other MX financial centers of gravity are lucrative cyber attack targets.  Like their US counterparts, they can't survive these attacks without greater cybersecurity and data protection assistance from the MX government. Our economies survive on the backs of our SMBs.  Make the investment! You will see immediate ROI. 

more...
No comment yet.
Scooped by Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT
Scoop.it!

Michigan Moves Ahead On Computer Security Effort - CBS Local

Michigan Moves Ahead On Computer Security Effort - CBS Local | Information Security | Scoop.it

As CBS Local
Michigan Moves Ahead On Computer Security Effort
CBS Local
Data theft and security breaches can be costly, both to businesses and the government.

Christopher Stevens, CIPP/US, CIPP/G, CIPM, CIPT's insight:

As a Michigander, I am glad to see MI partnering with the private sector to protect their joint interests from cyberattacks.  These public-private sector partnerships are the only way that SMBs can obtain access to the info and tools necessary to thwart and mitigate the impacts of these breaches. I would like to see more states enter into these agreements. The Federal government can then focus on national-level policies and strategies. 

more...
No comment yet.