{"id":1228,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail70-wdc01-mcdlv-net\/"},"modified":"2021-12-30T11:38:59","modified_gmt":"2021-12-30T11:38:59","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail70-wdc01-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail70-wdc01-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail70.wdc01.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* US House of Representatives bans Yahoo Mail and Google App Engine over malware concerns<br \/>\n* Symantec&#8217;s Cheri McGuire named CISO of Standard Chartered bank<br \/>\n* The cyber-security buck should stop with executives, finds survey<br \/>\n* A key security takeaway from Walmart&#8217;s chip-and-PIN suit against Visa<br \/>\n* Vulnerability management trends in Asia Pacific<br \/>\n* Five Useful Tips to Build a Successful and Mature Security Operations Center<br \/>\n* Why incident response plans fail<br \/>\n* Are You Prepared for Your Vendor\u2019s Data Breach?<br \/>\n* New FireEye Research Reveals the Impact of High-Profile Security Breaches on U.S. Consumers&#8217; Trust of Brands<br \/>\n* 6 privacy landmines and how to avoid stepping on them<br \/>\n* Health Care Breaches Common, but Budgets Stay Mostly Flat: Survey<br \/>\n* FDIC Calls \u2018Major\u2019 Data Breaches Accidental<\/p>\n<p>US House of Representatives bans Yahoo Mail and Google App Engine over malware concerns<br \/>\nOn April 30, the House\u2019s Technology Service Desk informed users about an increase in ransomware related emails on third-party email services like Yahoo Mail and Gmail.<br \/>\nThe ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers.<br \/>\nThis raises the questions: are House workers using Yahoo Mail for official business, and, if they&#8217;re not, are they allowed to check their private email accounts on work devices?<br \/>\nThis ban appears to be unrelated to the ransomware attacks and is in response to indicators that attackers have been using Google&#8217;s platform to host a remote access trojan named BLT since June 2015, unnamed congressional sources told Reuters.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dc40542b38&#038;e=20056c7556<\/p>\n<p>Symantec&#8217;s Cheri McGuire named CISO of Standard Chartered bank<br \/>\nIn her new role, McGuire&#8217;s responsibilities will include cyber security governance, strategy, regulatory engagement, policy development, training and awareness, as well as industry stakeholder partnerships.<br \/>\nShe will also be accountable for the Bank\u2019s information security monitoring, third party risk management and vulnerability assessments.<br \/>\nShe will also become a member of the Bank\u2019s information technology and Operations Management Team.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8ff1a31213&#038;e=20056c7556<\/p>\n<p>The cyber-security buck should stop with executives, finds survey<br \/>\nVMWare presented new research today on the historically distant relationship between the issue of cyber-security, employees and the board.<br \/>\n29 percent of both groups believe that the CEO should be responsible for a significant data breach, and 38 percent of office workers and 22 percent of decision-makers believe that the buck should stop with the board following a breach.<br \/>\nHowever, research published in conjunction with the Economist Intelligent Unit earlier this year showed that only five percent of corporate leaders put cyber-security at the top of their priorities.<br \/>\nThis is not so much a technology problem, but perhaps a psychological, or sociological one.<br \/>\nIt&#8217;s a question of \u201chow much can people take\u201d.<br \/>\nSimply, its about making security as easy as possible for employees.<br \/>\nIn the report itself, Joe Baguley, CTO of VMware mentions that, \u201cSecurity is not just about technology.<br \/>\nAs the research shows, the decisions and behaviours of people will impact the integrity of a business\u201d.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2c81962459&#038;e=20056c7556<\/p>\n<p>A key security takeaway from Walmart&#8217;s chip-and-PIN suit against Visa<br \/>\nWalmart on Tuesday filed suit against Visa and charged the payment card provider with making it too easy for consumers to avoid some of the security features built into chip-and-PIN cards.<br \/>\nWalmart&#8217;s suit relates specifically to Visa debit cards and does not involve chip-and-PIN credit cards, which are making a much slower transition into the U.S. market.<br \/>\nDespite the implication of the name, chip-and-PIN cards can be configured to work without PINs.<br \/>\nAlthough the embedded chips make the cards more secure than those with magnetic stripes, they&#8217;re even more secure when used along with PINs.<br \/>\nThat&#8217;s the crux of Walmart&#8217;s lawsuit.<br \/>\nThe company says Visa forces it to give customers who use Visa-branded debit cards a choice between verifying purchases with PINs, or with signatures.<br \/>\nThe signature option invites fraud, according to Walmart.<br \/>\nAnd because Visa debit cards are common, many other retailers are also likely forced to let consumers choose to use lesser payment security measures, Sirota says.<br \/>\nThe moral of this story.<br \/>\nIf you have a choice between using a PIN or signature to verify your identity when making a purchase, do yourself a favor and choose the former option.<br \/>\nSure, it&#8217;s yet another number to memorize, but the extra security will be more than worth the trouble if it helps you avoid a migraine associated with payment card fraud.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0e48d9ae27&#038;e=20056c7556<\/p>\n<p>Vulnerability management trends in Asia Pacific<br \/>\nA new study conducted by Forrester Consulting evaluated perceived challenges, drivers and benefits of various vulnerability management strategies and investments based on responses from information security professionals in Australia, China, Japan, New Zealand and Singapore.<br \/>\nAccording to survey results, one of the top security priorities of companies is protecting customer data, with a focus on application security, data security and protection of customers\u2019 personal information.<br \/>\nDespite their customer focus, only 22 percent of security decision makers performed continuous vulnerability assessments to monitor their environments for new threats.<br \/>\nThe majority of respondents (44 percent) conducted scans periodically, while 28 percent performed scans monthly.<br \/>\nForty-six percent of survey respondents cited reducing risk and improving security posture as the highest ranking security priority of all strategic IT objectives for companies in the Asia Pacific region.<br \/>\nThe potential vulnerabilities of companies are compounded as new technologies and devices are introduced by employees, customers and partners.<br \/>\nSuch attacks significantly affect the business, ranging from internal consequences such as decreased productivity (53 percent of respondents said that the impact of this was \u2018severe\u2019 or \u2018very severe\u2019) and increased operational expenses (60 percent) to detriments such as brand damage (51 percent), resulting in lost customer trust (57 percent) and lost revenue (51 percent).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0f817f5b39&#038;e=20056c7556<\/p>\n<p>Five Useful Tips to Build a Successful and Mature Security Operations Center<br \/>\n1) Know and Set Monitoring Goals<br \/>\n2) Find the Right Technical Configurations<br \/>\n3) Build the Right Security Operations Team<br \/>\n4) Have a Robust Incident Response Process<br \/>\n5) Lobby for Help From IT and Other Departments<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9b0ccb69f8&#038;e=20056c7556<\/p>\n<p>Why incident response plans fail<br \/>\nRather than identifying, analyzing and eradicating the threat, organizations can easily become entangled in processes hindering response time and further endangering operations.<br \/>\nWhile many industrial organizations have an IR plan in place, very few run through a routine simulation exercise of this plan.<br \/>\nSimulated exercises reveal various incorrect assumptions made throughout the IR process and identify gaping holes where there are missing contacts or protocols that are critical for a successful IR program.<br \/>\nWhen an incident occurs, key stakeholders want to be aware of what\u2019s happening and how the situation is being addressed.<br \/>\nKeeping executives in the know and managing expectations around the line of communication is an important part of an IR plan.<br \/>\nThere should be an assigned \u201cincident captain\u201d who can quickly alert the necessary parties and inform them of immediate next steps.<br \/>\nWhen it comes to managing suppliers in an IR plan, there are a number of questions or assumptions that should be verified during a simulated exercise.<br \/>\nWhat role do your suppliers play in the event of an attack.<br \/>\nDo they have a contractual agreement that outlines their role in IR and disclosure around cyber incidents.<br \/>\nDo they install software that was purchased from another vendor.<br \/>\nDo suppliers know what software you have in operation.<br \/>\nDo they run simulated testing of software updates on machines prior to actual implementation?<br \/>\nAttacks are part of today\u2019s connected environment, so IR is not as much about the attack but rather resiliency.<br \/>\nCybersecurity practices need to be collaborative and open, not only within an organization but across industries.<br \/>\nExecutives should be thinking about how they inventory assets and what type of services they would require from manufacturers to deal with a cyber incident.<br \/>\nThey must communicate a clear picture to the board of what is required and how this plan will be executed efficiently.<br \/>\nRunning through an IR exercise helps raise awareness about cybersecurity within an organization and creates a resilient business culture that is prepared for anything.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5d576b1348&#038;e=20056c7556<\/p>\n<p>Are You Prepared for Your Vendor\u2019s Data Breach?<br \/>\nEver since the Target and Home Depot breaches were traced to intrusions at their vendors, the management of cybersecurity at third-party vendors has been a focus of companies and regulators.<br \/>\nThe FTC has flagged the issue, as has the SEC.<br \/>\nThe DoD has imposed strict cybersecurity requirements for contractors that \u201cflow down\u201d to sub-contractors.<br \/>\nRevisiting third-party risk management in view of recent cyber attacks presents some important takeaways for companies and vendors to consider:<br \/>\n&#8211; Collaborate on data security<br \/>\n&#8211; Be prepared for a breach<br \/>\n&#8211; Review your contractual terms<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0300348919&#038;e=20056c7556<\/p>\n<p>New FireEye Research Reveals the Impact of High-Profile Security Breaches on U.S. Consumers&#8217; Trust of Brands<br \/>\nMILPITAS, CA&#8211;(Marketwired &#8211; May 12, 2016) &#8211; FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today&#8217;s advanced cyber attacks, today released the results of new research that finds high-profile data breaches are negatively impacting consumer trust in major brands.<br \/>\nThe FireEye commissioned research &#8212; conducted by independent technology market research specialist Vanson Bourne with a survey of 2,000 adults within the U.S. in April 2016 &#8212; confirms the rising public concerns of data privacy.<br \/>\nFindings revealed that 76 percent of respondents would likely take their business elsewhere due to negligent data handling practices.<br \/>\nAdditionally, 75 percent of consumers stated they were likely to stop purchasing from a company if a data breach was found to be linked to the board failing to prioritize cyber security.<br \/>\nThe survey findings also highlight the potential long-term financial impact of data breaches on major brands, with 59 percent of consumers warning they would take legal action against companies if a data breach resulted in their personal details being used for criminal purposes. 72 percent of consumers also reported that they will now share fewer personal details with companies, which could hit the revenues of organizations &#8212; from social media platforms to search engines &#8212; that rely on collecting detailed consumer data for advertisers.<br \/>\nOther key findings included the following:<\/p>\n<p>52 percent of consumers would consider paying more for the same products or services from a provider with better data security<br \/>\n54 percent of consumers feel more negatively of organizations breached<br \/>\n78 percent of consumers are cautious of organizations&#8217; abilities to keep data safe<br \/>\n52 percent of consumers said security is an important or main consideration when buying products and services<br \/>\n90 percent of consumers expect to be informed within 24 hours if their service provider had suffered a data breach which could have compromised their data<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d166125d11&#038;e=20056c7556<\/p>\n<p>6 privacy landmines and how to avoid stepping on them<br \/>\nErin Whaley, a partner at the law firm Troutman Sanders, outlined what those are and shared half-a-dozen tips for avoiding them.<br \/>\n1) As long as I have cybersecurity insurance I\u2019ll be covered in the event of a breach.<br \/>\nIt\u2019s not that simple.<br \/>\n2) Our team can handle any incident internally.<br \/>\nEven providers who really have the best professionals in the country should seek outside help.<br \/>\n3) Social media isn\u2019t a big concern for us. \u201cDo not think social media is not a problem for you,\u201d Whaley contended.<br \/>\n4) Business associate agreements are just a form agreement.<br \/>\nOur lawyers don\u2019t need to review them.<br \/>\nWhaley explained that more BA\u2019s fall into this trap than healthcare providers, there are some hospitals that do as well and for a variety of reasons, most notably that they think BA agreements are similar and they don\u2019t want things held up in legal review.<br \/>\n5) As long as I\u2019m HIPAA compliant, I don\u2019t have to worry about other privacy laws. \u201cThat is not true,\u201d Whaley said. &#8220;There are other privacy laws.\u201d<br \/>\n6) We do a fine job responding to requests from individuals for their records.<br \/>\nUpdating this process is not a priority. \u201cYou should go ahead and look at the process for responding to individual requests for records,\u201d Whaley said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8cbd2413aa&#038;e=20056c7556<\/p>\n<p>Health Care Breaches Common, but Budgets Stay Mostly Flat: Survey<br \/>\nAlmost 90 percent of hospitals and insurers have had a breach in the past two years, but budgets have risen for less than a third of health care organizations.<br \/>\nBased on multiple interviews with 91 health insurers and hospitals and 84 business associates, the survey found that 89 percent of health care organizations had a data breach in the past two years, with nearly half having more than five data breaches.<br \/>\nWhile most of the breaches were small, encompassing less than 500 records, the average cost of a breach was $2.2 million over two years for health care providers and insurers and more than $1 million for business associates, according to the survey.<br \/>\nAs a result of breaches, more than half of all companies have become better at vetting third-party partners, spent more on security technology and focused on employee training.<br \/>\nHowever, the demand for security personnel has prevented nearly three-quarters of health care firms from hiring more skilled IT security personnel, the survey found.<br \/>\nIn addition, half of respondents did not see any change in budgets, while about 30 percent saw an increase over the past two years.<br \/>\nTo a large extent, both seem to lack preparedness.<br \/>\nOnly 8 percent of health care organizations conduct vulnerability assessments quarterly, and 25 percent of business associates do so, the survey found.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b783b6877b&#038;e=20056c7556<\/p>\n<p>FDIC Calls \u2018Major\u2019 Data Breaches Accidental<br \/>\nThere is a difference of opinion within the federal government about what counts as a &#8220;major&#8221; data breach.<br \/>\nThe debate over the breadth and depth of the adjective is more than semantic.<br \/>\nThe failure of an agency to classify a cyberincident as a &#8220;major&#8221; one could stall reporting of the incident.<br \/>\nFor example, since October 2015, seven Federal Deposit Insurance Corporation employees who retired or moved on to other jobs each took with them 10,000 or more sensitive records inadvertently, according to FDIC Chief Information Officer Lawrence Gross.<br \/>\nHe did not categorize any of the losses as a major cyberincident at the time.<br \/>\nBut under 2014 cyber reforms, the rules say if agency data remains outside the government\u2019s control for at least eight hours or if the situation involves more than 10,000 records, that agency is dealing with a &#8220;major&#8221; incident that requires notifying Congress within seven days.<br \/>\nGross testified before a House Science Committee panel that he did not believe the breaches merited the &#8220;major&#8221; label, as defined last October by White House rules, because each worker had been authorized to see the data at issue.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2d6748e545&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=a107cc6b71)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage2.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * US House of Representatives bans Yahoo Mail and Google App Engine over malware concerns * Symantec&#8217;s Cheri McGuire named CISO of Standard Chartered bank * The cyber-security buck should stop with&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1228","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1228"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1228\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1228\/revisions\/3715"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}