{"id":1202,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail203-atl101-mcdlv-net\/"},"modified":"2021-12-30T11:38:57","modified_gmt":"2021-12-30T11:38:57","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail203-atl101-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail203-atl101-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail203.atl101.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nAnybody going to RSA conference.. Let me know. Paul<br \/>\nSo onto the news:<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>**<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n* Cyber crime is fastest growing economic crime, says PwC report<br \/>\n* Linedata Services : Cybercrime looms large on the horizon for asset managers, but regulation and operational systems remain immediate priorities<br \/>\n* Risk management key to cyber security, says Bank of England CISO<br \/>\n* U.S. Asks Tech and Entertainment Industries Help in Fighting Terrorism<br \/>\n* One-third of North Texas companies surveyed say they\u2019ve been cyberattack victims<br \/>\n* Last Year 700 Million Records Were Compromised<br \/>\n* Rhode Island Amends Identity Theft Protection Act<br \/>\n* Why Security Pros Are Always Under Pressure<br \/>\n* How to Suck at Information Security \u2013 A Cheat Sheet<br \/>\n* Free Online Tools for Looking up Potentially Malicious Websites<br \/>\n* New insurance product focuses on prompt alerting of cyber risks<\/p>\n<p>Cyber crime is fastest growing economic crime, says PwC report<br \/>\nCyber crime is up 20% since 2014 and is the fastest growing economic crime, according to PricewaterhouseCoopers\u2019s (PWC) latest biennial Global Economic Crime Survey.<br \/>\nThe UK has seen a double-digit rise in economic crime against corporates in the past two years, with 55% of organisations affected \u2013 up 11% since 2014 and well above the US (38%) and China (28%).<br \/>\nGlobally, the economic crime rate has remained largely static at 36%, according to the survey of more than 6,000 respondents in 115 countries.<br \/>\nThe survey found that 60 % of economic crime in the UK was committed by external perpetrators, up from 56% in 2014.<br \/>\nWhile there was a decline in economic crime perpetrated by employees (31%), there was an 11% increase in fraud committed by senior management to 18%.<br \/>\nHowever, only 12% of UK respondents believe that law enforcement authorities have the necessary skills and resources to investigate it, compared with 23% globally.<br \/>\nAlmost a third of UK organisations say they have no cyber incident response plan.<br \/>\nSurprisingly, almost half say that cyber crime would have no effect on their reputation, and almost 60% are not concerned about the potential for theft of intellectual property.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=14601ea349&#038;e=20056c7556<\/p>\n<p>Linedata Services : Cybercrime looms large on the horizon for asset managers, but regulation and operational systems remain immediate priorities<br \/>\nPARIS, BOSTON, LONDON, HONG KONG, NEW YORK, February 25, 2016 &#8211; Linedata (NYSE Euronext: LIN), the global solutions provider dedicated to the investment management and credit industries, releases the results of the 2016 Global Asset Management and Administration Survey.<br \/>\n\u2022 Cybercrime is seen as the greatest business disruptor over the next five years<br \/>\n\u2022 58% of respondents cite regulation as their main concern<br \/>\n\u2022 35% see ETFs as a major growth area over the next 12 months<br \/>\n\u2022 Just 8% see Blockchain as a potential disruptor over the next five years<br \/>\n\u2022 Client service seen as the most powerful way of standing out from the crowd<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=eea2bf4f79&#038;e=20056c7556<\/p>\n<p>Risk management key to cyber security, says Bank of England CISO<br \/>\nRisk management is a vital component of any cyber security strategy, security experts told the European Information Security Summit 2016 in London.<br \/>\n\u201cBut cyber risk is not about technology alone; it is also about people and processes, and therefore it is about leadership and management,\u201d said Will Brandon, chief information security officer at the Bank of England.<br \/>\n\u201cAny cyber risk is combination of threats, vulnerabilities and assets \u2013 and all three have to be present for a risk to exist,\u201d said Brandon.<br \/>\nAccording to Brandon, every organisation needs a range of mitigations and controls aimed at reducing the risk of the most likely threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=06e7b428c7&#038;e=20056c7556<\/p>\n<p>U.S. Asks Tech and Entertainment Industries Help in Fighting Terrorism<br \/>\nObama administration officials met with executives of major technology and entertainment companies in Washington on Wednesday to discuss combating the activities of violent extremists online, according to industry and government officials.<br \/>\nMany of the tech companies are willing to work on ways to combat violent extremism on social media.<br \/>\nThe meeting on Wednesday, called the \u201cMadison Valleywood Project,\u201d in reference to the participation of marketing, tech and entertainment firms, focused on terrorists\u2019 use of social media to organize and recruit members for violent extremism.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=326b8528ae&#038;e=20056c7556<\/p>\n<p>One-third of North Texas companies surveyed say they\u2019ve been cyberattack victims<br \/>\nForty-two percent of the companies surveyed by Deloitte said they have cyber insurance.<br \/>\nOnly 16 percent of the companies said they did not have a cyber incident response plan.<br \/>\n1 in 3 D\/FW companies said they\u2019ve been victims of a cyberattack in the last two years.<br \/>\n97 percent said they believe it\u2019s important to understand the nature of cyber threats.<br \/>\n42 percent said their company has cyber insurance.<br \/>\n55 percent said their company does not have cyber insurance.<br \/>\n16 percent said their company does not have a cyber incident response plan.<br \/>\n81 percent said they\u2019ve been involved in rehearsals of the cyber incident response plan.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c81c9c6a9f&#038;e=20056c7556<\/p>\n<p>Last Year 700 Million Records Were Compromised<br \/>\nOver 700 million data records were compromised last year thanks to 1,673 data breaches, according to digital security firm Gemalto.<br \/>\nThe majority of incidents (53%) were related to identity theft rather than financial access (22%) or account access (11%).<br \/>\nMalicious outsiders accounted for the majority of breach incidents (58%), with accidental loss (24%) and then malicious insiders (14%) coming next.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b1545a24ef&#038;e=20056c7556<\/p>\n<p>Rhode Island Amends Identity Theft Protection Act<br \/>\nRhode Island recently amended its 10-year-old Identity Theft Protection Act effective June 26, 2016, further defining and refining existing data security and breach notification requirements, and adding a requirement to notify the Rhode Island Attorney General of certain breaches.<br \/>\nMore specifically, the amended statute, available here, makes the following changes to Rhode Island\u2019s existing information security and breach notification law:<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2707a23d6f&#038;e=20056c7556<\/p>\n<p>Why Security Pros Are Always Under Pressure<br \/>\nA shortage of security expertise is now the third biggest pressure security professionals face, up from eighth last year, according to a new report.<br \/>\nAdvanced security threats and the adoption of emerging technologies are the two concerns ahead of the shrinking pool of security experts.<br \/>\nThe goal of the survey was to measure the variety of pressures IT pros face regarding security.<br \/>\nThe report, &#8220;2016 Security Pressures Report,&#8221; was commissioned by security firm Trustwave and surveyed 1,414 security decision-makers or security influencers.<br \/>\nThey included CIOs, CISOs, CSOs, IT\/IT security directors and IT\/IT security managers worldwide.<br \/>\nMore than 600 respondents were from the United States, 210 from Canada, 204 from the United Kingdom, 202 from Australia and 194 from Singapore. &#8220;The job hazards are unmistakable for those whose mission it is to identify, protect, detect and respond to digital harms,&#8221; says the report, &#8220;Studies have shown that high stress levels at work lead to less productive workers, and security professionals can ill-afford to disengage from their jobs.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=91da7b26d2&#038;e=20056c7556<\/p>\n<p>How to Suck at Information Security \u2013 A Cheat Sheet<br \/>\nThis cheat sheet presents common information security mistakes, so you can avoid making them.<br \/>\nYeah, the idea is that you should do the opposite of what it says below.<br \/>\nTo print, use the one-sheet PDF version; you can also edit the Word version for you own needs.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1337f51425&#038;e=20056c7556<\/p>\n<p>Free Online Tools for Looking up Potentially Malicious Websites<br \/>\nSeveral organizations offer free on-line tools for looking up a potentially malicious website.<br \/>\nSome of these tools provide historical information; others examine the URL in real time to identify threats&#8230;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8c51bc0397&#038;e=20056c7556<\/p>\n<p>New insurance product focuses on prompt alerting of cyber risks<br \/>\nIronPro, the professional liability unit of Ironshore Inc., on Wednesday said it has launched a suite of enhanced risk management services for cyber policyholders.<br \/>\nIronPro will provide policyholders with cyber monitoring and alert services, working with Atlanta-based security firm BorderHawk L.L.C. to analyze cyber activity and detect questionable client events, New York-based Ironshore said in a statement.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a553cd9e47&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=443fec88ca)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 Anybody going to RSA conference.. Let me know. Paul So onto the news: ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; ** &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; * Cyber crime is fastest&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1202","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1202"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1202\/revisions"}],"predecessor-version":[{"id":3689,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1202\/revisions\/3689"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}