{"id":1200,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail28-atl111-rsgsv-net\/"},"modified":"2021-12-30T11:38:56","modified_gmt":"2021-12-30T11:38:56","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail28-atl111-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail28-atl111-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail28.atl111.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n* Australian executives more concerned, engaged with email security issues than overseas peers: Mimecast<br \/>\n* France votes to extend state of emergency to May 26 with terrorism threat &#8216;never higher&#8217;<br \/>\n* Are you ready for EU General Data Protection Regulation changes?<br \/>\n* Instagram\u2019s new security feature will help keep hackers out of your account<br \/>\n* Insurance execs changing technology use amid complex risks<br \/>\n* Five Tips for Keeping Security Costs Down<br \/>\n* Biggest risks and GRC challenges for 2016 are disclosed<br \/>\n* Visualizing The Cisco Annual Security Report (ASR 2016)<br \/>\n* Internal auditors challenged by cyber-security, data quality<\/p>\n<p>Australian executives more concerned, engaged with email security issues than overseas peers: Mimecast<br \/>\nAustralians are more worried about email security than their peers in comparable countries and fully half of IT decision-makers believe their organisations are more vulnerable to attack than they were 12 months ago, according to new survey results that also found Australian businesses are more concerned about email breaches causing reputational damage than about the actual loss of data.<br \/>\nThe figures \u2013 collated in Mimecast&#8217;s Email Security Uncovered survey of 600 IT decision-makers in the US, UK, South Africa and Australia \u2013 also found that 40 percent and 39 percent of Australian respondents felt unprepared to deal with malicious insider attacks and the compromise of mobile devices, respectively.<br \/>\nThe numbers suggested that concerns about email security have permeated the C-level far more in Australia than in other countries, with 95 percent of respondents saying C-level executives were engaged with email security and risk-management practices \u2013 compared to 89 percent in South Africa and 74 percent in the UK.<br \/>\nAustralia was the only of the four surveyed markets to report that no C-suite executives were &#8216;not at all engaged&#8217; with email security.<br \/>\nDespite their impact, the report noted that experience gained during attacks \u201ccan be a key tool to inform strategies to combat future threats\u201d and noted that IT security managers with direct experience in handling an attack generally felt more exposed to email threats than their peers with no direct experience.<br \/>\nThe research also found that Australians were more concerned about ransomware than their overseas peers, with 34 percent rating ransomware as a high threat compared to 25 percent in the US and 18 percent in South Africa.<br \/>\nThis is consistent with ongoing reports suggesting that ransomware authors are particularly targeting Australians with schemes designed to exploit Australians&#8217; relative wealth and technological nous.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c0af7af5e9&#038;e=20056c7556<\/p>\n<p>France votes to extend state of emergency to May 26 with terrorism threat &#8216;never higher&#8217;<br \/>\nThe French parliament has voted to extend the country&#8217;s state of emergency, implemented after the November 13 terrorist attacks, by a further three months to May 26 as the Government warns the threat of an attack remains great.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b80255abc4&#038;e=20056c7556<\/p>\n<p>Are you ready for EU General Data Protection Regulation changes?<br \/>\nThe GDPR promises to force companies to scrutinise how they process and handle customer data, with mandatory reporting of breaches &#8216;that are likely to harm individuals&#8217; and potential fines of up to 4% of global revenues.<br \/>\n&#8211; Mandatory breach notification: Should an organisation suffer a breach that compromises data, it will have 72 hours to report it to the information commissioner responsible in that country.<br \/>\nA single set of rules: Rather than maintaining 28 different national standards for data management, the GDPR will introduce a single set of regulations covering the EU as a whole.<br \/>\nPutting the owner&#8217;s rights first:<br \/>\nBusinesses that collect data must now do so explicitly, rather than assuming consent.<br \/>\nIndividuals will also be able to withdraw their own data at any point, as part of the EU&#8217;s well-publicised &#8216;right to be forgotten&#8217;.<br \/>\nastly, in order to avoid the sizeable penalties mentioned above, organisations must still ensure that their staff are aware of and prepared to guard against the risk of data breaches.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ccf67470cf&#038;e=20056c7556<\/p>\n<p>Instagram\u2019s new security feature will help keep hackers out of your account<br \/>\nThe most surprising thing about Instagram rolling out two-factor authentication is that it didn\u2019t do it sooner.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7a1fbbaef3&#038;e=20056c7556<\/p>\n<p>Insurance execs changing technology use amid complex risks<br \/>\nMore than 70 percent of insurance chief executive officers (CEOs) are making significant changes to the way they use technology to assess and meet customer expectations, according to a new survey by PwC.<br \/>\nThe report found that threats businesses are facing are becoming more complex, crossing the borders of geopolitics, regulation, cyber security, societal development, people and reputation, according to PwC.<br \/>\nAccordingly, 64 percent of insurance CEOs are making significant changes to the way they define and manage risks in response to changing stakeholder expectations.<br \/>\nSeventy nine percent of insurance CEOs see cyber threats as a barrier to growth, more than their counterparts in banking and capital markets.<br \/>\nPwC also said that cyber risk could expose insurers to significant losses, both through specific cyber coverage and their technology, errors and omissions, and other existing business lines.<br \/>\nIt said a UK Government report estimates that the insurance industry\u2019s global cyber-risk exposure is already in the order of \u00a3100 billion ($140 billion).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b60a17e585&#038;e=20056c7556<\/p>\n<p>Five Tips for Keeping Security Costs Down<br \/>\n1: Build an integrated remote monitoring and management solution.<br \/>\n2: A unified system is needed for monitoring, managing and securing endpoint devices.<br \/>\n3: Gain platform robustness from a one-stop shop.<br \/>\n4: Insuring your business against cyber-threats helps.<br \/>\n5. Make a cyber-security assessment.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4597e0c520&#038;e=20056c7556<\/p>\n<p>Biggest risks and GRC challenges for 2016 are disclosed<br \/>\nA need to improve overall risk oversight (76.2 percent) is a key driver for investment in governance, risk, and compliance (GRC), says MetricStream.<br \/>\nOver half (54 percent) of new business initiatives introduce new risk and regulatory concerns, suggesting that risk management professionals have evolved beyond compliance and are much more business-focused.<br \/>\nData privacy and protection issues make up 39.5 percent of GRC investment influencers, reflecting a business where data privacy, protection and cyber-security are more important now than ever before.<br \/>\nOrganisations have said that they will place GRC technology spending as a higher priority than GRC services for third party risk management.<br \/>\nLess than five percent of organisations assume they will lower their GRC spend in 2016.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4654ad172d&#038;e=20056c7556<\/p>\n<p>Visualizing The Cisco Annual Security Report (ASR 2016)<br \/>\nThis year\u2019s visuals were all built with our open source tool OpenGraphiti and were all select attacks that were highlighted within the Cisco report.<br \/>\nOpenGraphiti allows researchers, not only create visual representations of the attackers infrastructure, but also interact with the data in 3D.<br \/>\nWith that we also included recordings of us pivoting through the data in the following attacks.<br \/>\nAll attack information was obtained from OpenDNS\u2019s Security Graph, which is based on our view into more than 90 billion daily DNS requests.<br \/>\nEach of the visualizations include examples of: the attacker\u2019s infrastructure domains, IPs, WHOIS information, co-occurrences, name servers, and traffic patterns.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=75298f3fdd&#038;e=20056c7556<\/p>\n<p>Internal auditors challenged by cyber-security, data quality<br \/>\nAbout half of internal audit leaders lack confidence in their staffs\u2019 cyber-security expertise, and nearly half say internal audit has little or no involvement in evaluating the quality of data used in their organisation, according to a new survey.<br \/>\nFifty-two per cent of the nearly 500 respondents to The Institute of Internal Auditors (IIA) North American pulse survey said that a lack of cyber-security expertise amongst internal audit staff very much or extremely affects internal audit\u2019s ability to address cyber-security risk.<br \/>\nJust one-quarter of respondents who reported having a business continuity plan said their plan provides clear, specific procedures in response to a data breach.<br \/>\nAnd 17% said their plans provide no data breach or cyber-attack procedures at all.<br \/>\nWith regard to cyber-security, internal audit organisations primarily are focused on prevention.<br \/>\nMore than half (53%) of respondents said prevention efforts, such as hardening interior or external barriers, are the most effective method for addressing a cyber-attack.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a7f4e5172&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=6ce9d1c388)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; * Australian executives more concerned, engaged with email security issues than overseas peers: Mimecast * France votes to extend state&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1200","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1200"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1200\/revisions"}],"predecessor-version":[{"id":3687,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1200\/revisions\/3687"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}