Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail203.atl101.mcdlv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
Anybody going to RSA conference.. Let me know. Paul
So onto the news:

**
————————————————————

**
————————————————————

**
————————————————————

**
————————————————————

**
————————————————————

**
————————————————————

**
————————————————————
* Cyber crime is fastest growing economic crime, says PwC report
* Linedata Services : Cybercrime looms large on the horizon for asset managers, but regulation and operational systems remain immediate priorities
* Risk management key to cyber security, says Bank of England CISO
* U.S. Asks Tech and Entertainment Industries Help in Fighting Terrorism
* One-third of North Texas companies surveyed say they’ve been cyberattack victims
* Last Year 700 Million Records Were Compromised
* Rhode Island Amends Identity Theft Protection Act
* Why Security Pros Are Always Under Pressure
* How to Suck at Information Security – A Cheat Sheet
* Free Online Tools for Looking up Potentially Malicious Websites
* New insurance product focuses on prompt alerting of cyber risks

Cyber crime is fastest growing economic crime, says PwC report
Cyber crime is up 20% since 2014 and is the fastest growing economic crime, according to PricewaterhouseCoopers’s (PWC) latest biennial Global Economic Crime Survey.
The UK has seen a double-digit rise in economic crime against corporates in the past two years, with 55% of organisations affected – up 11% since 2014 and well above the US (38%) and China (28%).
Globally, the economic crime rate has remained largely static at 36%, according to the survey of more than 6,000 respondents in 115 countries.
The survey found that 60 % of economic crime in the UK was committed by external perpetrators, up from 56% in 2014.
While there was a decline in economic crime perpetrated by employees (31%), there was an 11% increase in fraud committed by senior management to 18%.
However, only 12% of UK respondents believe that law enforcement authorities have the necessary skills and resources to investigate it, compared with 23% globally.
Almost a third of UK organisations say they have no cyber incident response plan.
Surprisingly, almost half say that cyber crime would have no effect on their reputation, and almost 60% are not concerned about the potential for theft of intellectual property.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=14601ea349&e=20056c7556

Linedata Services : Cybercrime looms large on the horizon for asset managers, but regulation and operational systems remain immediate priorities
PARIS, BOSTON, LONDON, HONG KONG, NEW YORK, February 25, 2016 – Linedata (NYSE Euronext: LIN), the global solutions provider dedicated to the investment management and credit industries, releases the results of the 2016 Global Asset Management and Administration Survey.
• Cybercrime is seen as the greatest business disruptor over the next five years
• 58% of respondents cite regulation as their main concern
• 35% see ETFs as a major growth area over the next 12 months
• Just 8% see Blockchain as a potential disruptor over the next five years
• Client service seen as the most powerful way of standing out from the crowd
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=eea2bf4f79&e=20056c7556

Risk management key to cyber security, says Bank of England CISO
Risk management is a vital component of any cyber security strategy, security experts told the European Information Security Summit 2016 in London.
“But cyber risk is not about technology alone; it is also about people and processes, and therefore it is about leadership and management,” said Will Brandon, chief information security officer at the Bank of England.
“Any cyber risk is combination of threats, vulnerabilities and assets – and all three have to be present for a risk to exist,” said Brandon.
According to Brandon, every organisation needs a range of mitigations and controls aimed at reducing the risk of the most likely threats.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=06e7b428c7&e=20056c7556

U.S. Asks Tech and Entertainment Industries Help in Fighting Terrorism
Obama administration officials met with executives of major technology and entertainment companies in Washington on Wednesday to discuss combating the activities of violent extremists online, according to industry and government officials.
Many of the tech companies are willing to work on ways to combat violent extremism on social media.
The meeting on Wednesday, called the “Madison Valleywood Project,” in reference to the participation of marketing, tech and entertainment firms, focused on terrorists’ use of social media to organize and recruit members for violent extremism.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=326b8528ae&e=20056c7556

One-third of North Texas companies surveyed say they’ve been cyberattack victims
Forty-two percent of the companies surveyed by Deloitte said they have cyber insurance.
Only 16 percent of the companies said they did not have a cyber incident response plan.
1 in 3 D/FW companies said they’ve been victims of a cyberattack in the last two years.
97 percent said they believe it’s important to understand the nature of cyber threats.
42 percent said their company has cyber insurance.
55 percent said their company does not have cyber insurance.
16 percent said their company does not have a cyber incident response plan.
81 percent said they’ve been involved in rehearsals of the cyber incident response plan.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c81c9c6a9f&e=20056c7556

Last Year 700 Million Records Were Compromised
Over 700 million data records were compromised last year thanks to 1,673 data breaches, according to digital security firm Gemalto.
The majority of incidents (53%) were related to identity theft rather than financial access (22%) or account access (11%).
Malicious outsiders accounted for the majority of breach incidents (58%), with accidental loss (24%) and then malicious insiders (14%) coming next.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b1545a24ef&e=20056c7556

Rhode Island Amends Identity Theft Protection Act
Rhode Island recently amended its 10-year-old Identity Theft Protection Act effective June 26, 2016, further defining and refining existing data security and breach notification requirements, and adding a requirement to notify the Rhode Island Attorney General of certain breaches.
More specifically, the amended statute, available here, makes the following changes to Rhode Island’s existing information security and breach notification law:
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=2707a23d6f&e=20056c7556

Why Security Pros Are Always Under Pressure
A shortage of security expertise is now the third biggest pressure security professionals face, up from eighth last year, according to a new report.
Advanced security threats and the adoption of emerging technologies are the two concerns ahead of the shrinking pool of security experts.
The goal of the survey was to measure the variety of pressures IT pros face regarding security.
The report, “2016 Security Pressures Report,” was commissioned by security firm Trustwave and surveyed 1,414 security decision-makers or security influencers.
They included CIOs, CISOs, CSOs, IT/IT security directors and IT/IT security managers worldwide.
More than 600 respondents were from the United States, 210 from Canada, 204 from the United Kingdom, 202 from Australia and 194 from Singapore. “The job hazards are unmistakable for those whose mission it is to identify, protect, detect and respond to digital harms,” says the report, “Studies have shown that high stress levels at work lead to less productive workers, and security professionals can ill-afford to disengage from their jobs.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=91da7b26d2&e=20056c7556

How to Suck at Information Security – A Cheat Sheet
This cheat sheet presents common information security mistakes, so you can avoid making them.
Yeah, the idea is that you should do the opposite of what it says below.
To print, use the one-sheet PDF version; you can also edit the Word version for you own needs.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=1337f51425&e=20056c7556

Free Online Tools for Looking up Potentially Malicious Websites
Several organizations offer free on-line tools for looking up a potentially malicious website.
Some of these tools provide historical information; others examine the URL in real time to identify threats…
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=8c51bc0397&e=20056c7556

New insurance product focuses on prompt alerting of cyber risks
IronPro, the professional liability unit of Ironshore Inc., on Wednesday said it has launched a suite of enhanced risk management services for cyber policyholders.
IronPro will provide policyholders with cyber monitoring and alert services, working with Atlanta-based security firm BorderHawk L.L.C. to analyze cyber activity and detect questionable client events, New York-based Ironshore said in a statement.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=a553cd9e47&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=443fec88ca)

** Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme