{"id":2501,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail175-atl101-mcdlv-net\/"},"modified":"2021-12-30T11:41:27","modified_gmt":"2021-12-30T11:41:27","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail175-atl101-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail175-atl101-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail175.atl101.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* How Cybercrime Has Changed (Infographic)<br \/>\n* The modern look of a utility&#8217;s chief security officer<br \/>\n* Cyber security slated to become standalone practice<br \/>\n* Google Ramps Up Fight Against Deceptive Software Installations, Aims For &#8216;Clean Software&#8217; Industry Standards<br \/>\n* This Software Is So Sleazy Google Calls It \u2018Ooze\u2019<br \/>\n* The advanced security techniques of criminal hackers<br \/>\n* How to Use Dungeons and Dragons for Security Training<br \/>\n* Solving the IT skills crisis: the five skills businesses need IT to master<br \/>\n* Dry Lighting Cracks against the Cloud: The Rise of the Advanced Persistent DoS (APDoS)<br \/>\n* 58% of orgs have no controls in place to prevent insider threats<br \/>\n* The four cybersecurity terms everyone is talking about at Black Hat<br \/>\n* Obama officials seek industry input on revising cyber-incident response strategy<\/p>\n<p>How Cybercrime Has Changed (Infographic)<br \/>\nAn infographic from security firm BTB Security shows how many more breaches and incidents of indentity theft there were in 2015 than in 2005.<br \/>\nAs a result, 190 million consumers were compromised last year, compared to only 44.2 million ten years earlier.<br \/>\nCheck out the infographic below to see how much these online attacks are costing businesses, then make sure you have a secure password.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ae85795ae9&#038;e=20056c7556<\/p>\n<p>The modern look of a utility&#8217;s chief security officer<br \/>\nThe senior security professional, typically at the vice president or director level, now has direct access to the CEOand company boards of trustees, often to supply situational awareness of physical and cybersecurity issues.<br \/>\nThe CSO should have the ability to mold or shape policy from the boardroom or from the senior staff meeting.<br \/>\nThe good news for CSOs is that more board-level visibility can lead to more investment in security.<br \/>\nEven the best CSO, however, cannot be successful without backing from senior executives.<br \/>\nSo, what makes a CSO worth their weight in gold?<br \/>\nThe duties of the CSO have dramatically changed with the introduction of targeting electric infrastructure for attack, the advancement and reliance on cyber systems, and the job of ensuring compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards.<br \/>\nLikely the biggest responsibility is to create and foster a program that helps manage reputational risk.<br \/>\nA security event at a company, whether physical or cyber, can quickly ruin any good standing in the community or industry.<br \/>\nWhatever the range of duties, the security department&#8217;s prime mission must always align with the company&#8217;s.<br \/>\nThat means being a trusted partner.<br \/>\nThe modern CSO is business savvy and fully understands the impact that security has with respect to \u201ckeeping the lights on\u201d, business resiliency, reputational risk, and regulatory compliance.<br \/>\nToday\u2019s CSO must be an educator rather than an enforcer as he or she must be able to re-frame the security conversation away from mere loss avoidance and towards competitive advantage, efficiency, and risk reduction.<br \/>\nThe CSO must be technically adept, with an intuitive understanding of a company\u2019s assets, how attackers might penetrate them, and how to defend against attacks.<br \/>\nAnd because no company, no matter how invested it is in security, is fully immune from physical threats, the CSO must also understand how to deter, detect, and mitigate the attacks that do occur.<br \/>\nThe required skills for this position have matured and evolved over the past decade.<br \/>\nFormer law enforcement officers continue to be the logical first pick for many utilities.<br \/>\nHowever, very few investigations, domestic violence episodes, drug cases, or traffic violations occur at a utility.<br \/>\nFormer military personnel remain an effective alternative, especially those with an antiterrorism and force protection background, but often times lack advanced degrees or corporate experience.<br \/>\nhe biggest mistake that CSOs make is when they become complacent and think they\u2019ve solved the problem they are facing.<br \/>\nIn this business, you\u2019ve never solved the problem.<br \/>\nInstead, great CSOs are always scanning the horizon: They consider what mistakes they may be making and learn from the mistakes that others in their position make.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b4980927d1&#038;e=20056c7556<\/p>\n<p>Cyber security slated to become standalone practice<br \/>\nThe rapidly increasing level and complexity of cyber security work conducted by lawyers, coupled with the introduction of mandatory data breach notification, could see cyber security become a standalonepractice area, according to a partner.<br \/>\nFor a long time, privacy law in Australia has been focused on the Australian Privacy Principles and their predecessor, the National Privacy Principles, meaning a lot of legal work around privacy was relatively simple, according to Mr Salter.<br \/>\nAnother factor that may contribute to the increase of cyber security-related work is the introduction of mandatory data breach notification legislation in Australia.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0c72c159fa&#038;e=20056c7556<\/p>\n<p>Google Ramps Up Fight Against Deceptive Software Installations, Aims For &#8216;Clean Software&#8217; Industry Standards<br \/>\nGoogle\u2019s Safe Browsing service, used by Chrome, Firefox, and Safari, generates 60 million monthly warnings to users about deceptive software installations.<br \/>\nThis is three times more than the number of warnings shown by the service for malware.<br \/>\nGoogle and New York University (NYU) performed a study on all types of deceptive software and ads out there in order to better identify how to fight against them.<br \/>\nOver the course of a year, Google and NYU discovered that four of the largest pay-per-install (PPI) advertising networks routinely distributed unwanted ad injectors, browser settings hijackers, and scareware flagged by over 30 antivirus engines.<br \/>\nThese bundles were promoted through fake software updates, phony content lockers, and spoofed brands.<br \/>\nAll of these methods were being discussed openly on underground forums.<br \/>\nGoogle and NYU determined that there are three parties that enable the pay-per-install distribution model: advertisers, affiliate networks and publishers.<br \/>\nBeyond that, the company is also trying to work with other stakeholders in the industry, including anti-virus companies and bundling platforms, to distribute \u201cclean software.\u201d The initiative aims to create industry-wide standards that give users clear choices when installing software, while at the same time blocking deceptive ads.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f9ca5b9976&#038;e=20056c7556<\/p>\n<p>This Software Is So Sleazy Google Calls It \u2018Ooze\u2019<br \/>\nWhat qualifies as ooze.<br \/>\nGenerally, any software that deceives people into downloading it.<br \/>\nOoze can include ad injectors that cram unwanted ads onto webpages, browser setting hijackers that change the defaults on a person\u2019s web browser (for instance, by making a hijacker\u2019s preferred search engine the standard), or \u201cscareware\u201d that urges a person to install it to \u201cclean up\u201d his or her computer.<br \/>\nIn the shadier parts of what\u2019s known as the \u201cpay per install\u201d economy, software developers make money by bundling applications with other objectionable software, leading to the ooze epidemic, the researchers note.<br \/>\nThe incentives reward deception aimed at maximizing downloads, regardless of the consumer experience or outcome. (What separates this from the \u201cblackmarket\u201d variety is that it asks for user consent, albeit often underhandedly.)<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28016fbf33&#038;e=20056c7556<\/p>\n<p>The advanced security techniques of criminal hackers<br \/>\nI spoke with Rick Holland, former Forrester analyst and VP of strategy at Digital Shadows, at Black Hat about the security tools and techniques currently in use by cybercriminals.<br \/>\nWhat Holland had to say was both illuminating and, when considering the business of cybercrime, not entirely unfamiliar.<br \/>\n\u201cOpsec is a really good topic to be talking about in Vegas [Black Hat conference].<br \/>\nA lot of the things individuals are doing here, some of that applies to the bad guys,\u201d Holland says.<br \/>\nA term from the military world, &#8220;opsec&#8221; refers to tactics used to protect privacy and anonymity.<br \/>\nThe irony is that criminals rely on many of the same tools that defenders and internet users on the good side adopt to stay secure online &#8212; tools such as Tor and VPNs for network connectivity, bulletproof hosting, and Jabber and OTR protocol for online chats, according to Holland.<br \/>\nSnowden popularized Tails, the Linux distribution for the paranoid, Holland adds.<br \/>\nDefenders can capitalize on weak attacker opsec to gain insights into the people, process, and technology the attackers are using.<br \/>\nLapses in opsec give defenders the clue they need to stop the attack.<br \/>\nIn the new world where everything is online, any break is helpful.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e0f085b529&#038;e=20056c7556<\/p>\n<p>How to Use Dungeons and Dragons for Security Training<br \/>\nA Black Hat talk by Tiphaine Romand Latapie, Research Team Lead for Airbus Group Innovation, suggested a very novel approach to security training.<br \/>\nBlack Hat Bug Art&#8221;I&#8217;m going to talk to you about the role-playing game I designed to teach people who don&#8217;t know anything about security,&#8221; said Ms.<br \/>\nLatapie. &#8220;At first, I designed this just for me, to make my job easier, to train my coworkers.<br \/>\nI tested it on my family, friends, and coworkers, including project managers, top managers, retail, customer support, and call centers.&#8221;<br \/>\n&#8220;I looked at all the trainings available,&#8221; she said. &#8220;Most are technical trainings.<br \/>\nLet&#8217;s train them without talking about the technical aspects.<br \/>\nTheir misunderstandings are not technical.&#8221; She pointed out that neophytes do just fine with physical security.<br \/>\nThey close the door in the morning.<br \/>\nThey have insurance for their property. &#8220;I&#8217;m going to use that knowledge to teach them computer security,&#8221; said Latapie. &#8220;It will be different from other trainings.<br \/>\nI&#8217;m convinced people learn better when they&#8217;re having fun.<br \/>\nI want them to think for themselves, so a role-playing game seemed really good to me.&#8221;<br \/>\nLatapie proceeded to lay out the RPG process. &#8220;You need one meeting room and a paperboard or drawing board,&#8221; she said. &#8220;It&#8217;s an old-fashioned paper game, not a video game.<br \/>\nIt&#8217;s for four to eight people, on two teams, for 90 to 120 minutes.<br \/>\nYou don&#8217;t need dice, or a dragon.<br \/>\nI&#8217;m very sorry about that.<br \/>\nThe gamesmaster conducts the game scenario for 30-45 minutes and then debriefs the teams.&#8221;<br \/>\nHere&#8217;s how it works.<br \/>\nThere&#8217;s a big skyscraper in a busy city with an important object inside, something that would just fit in a backpack.<br \/>\nThe attacking team attempts to steal the object, while the defenders prevent the theft.<br \/>\nBoth have unlimited budget, but their in-game actions must hew to the laws of physics.<br \/>\nIn addition, the defenders must obey the law.<br \/>\nOnce the gamesmaster declares the game over, the debriefing begins. &#8220;How do you make it infosec.<br \/>\nYou go back to the minutes and show how each thing they said relates to security,&#8221; said Latapie. &#8220;They say they&#8217;ll add a badge reader, and you translate that to access control.<br \/>\nThey say they&#8217;ll use facial recognition, and you talk about biometrics.<br \/>\nThe attackers propose to black out the building&#8217;s electricity, and you tell them about denial of service attacks.&#8221;<br \/>\nLatapie offered tips for a successful scenario, such as asking who wants to be on the attacking team. &#8220;You don&#8217;t want shy attackers,&#8221; she said, &#8220;and you can switch the teams if you need to.<br \/>\nYou&#8217;re the gamesmaster; you are the rules.&#8221; She noted that the game doesn&#8217;t work well on security people. &#8220;They go too far too fast.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bf674a6f54&#038;e=20056c7556<\/p>\n<p>Solving the IT skills crisis: the five skills businesses need IT to master<br \/>\nNigel Hawthorn discusses the IT skills crisis and the five skills that will become vital to businesses operating in the cloud<br \/>\nHere are five skills that businesses will need IT to master to keep sensitive data secure:<br \/>\n1) Incident response management<br \/>\n2) Communication with non-IT departments and executives<br \/>\n3) Analysis expertise with very large datasets<br \/>\n4) Ability to write code and application development experience<br \/>\n5) Security certifications<br \/>\nUltimately, if IT is expected to drive innovation and growth, it requires individuals with the relevant abilities.<br \/>\nIT managers may already be complaining about the lack of skills within their teams, but the situation is only going to be exacerbated if the required steps aren&#8217;t taken now.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3d1d71b841&#038;e=20056c7556<\/p>\n<p>Dry Lighting Cracks against the Cloud: The Rise of the Advanced Persistent DoS (APDoS)<br \/>\nWikipedia defines APDoS as:<br \/>\n\u201cAPDoS is more likely to be perpetrated by actors who are well resourced, exceptionally skilled and have access to substantial commercial grade computer resources and capacity.<br \/>\nAPDoS attacks represent a clear and emerging threat needing specialised monitoring and incident response services and the defensive capabilities of specialised DDoS mitigation service providers.<br \/>\nThis type of attack involves massive network layer DDoS attacks through to focused application layer (HTTP) floods, followed by repeated (at varying intervals) SQLI and XSS attacks.<br \/>\nTypically, the perpetrators can simultaneously use from 2 to 5 attack vectors involving up to several tens of millions of requests per second, often accompanied by large SYN floods that can not only attack the victim but also any service provider implementing any sort of managed DDoS mitigation capability.<br \/>\nThese attacks can persist for several weeks.\u201d<br \/>\nNow, if you digest this and take a look at the types of attacks, it\u2019s clear that APDoS would require a lot of varied technology to stop the nature of network floods, HTTP application-level DDoS and encrypted threats.<br \/>\nMoreover, the case of Protonmail, we are now seeing the problem manifest to SMTP attacks (somewhat new vector) and secure-SMTP such as TLS over SMTP.<br \/>\nMany companies who have procured DDoS solutions have no thought about the threat from a broader spectrum such as SMTP or FTP and secure variants such as those.<br \/>\nThe task is clearly daunting and real.<br \/>\nAs the next generation of DDoS threats emerge we must be very diligent and proactive.<br \/>\nI believe that companies need to rise above the normal corporate culture of security controls and become obsessive about removing risks and compulsive about action.<br \/>\nAfter all, these organizations may literally be holding life and death decisions in their hands \u2013 and this makes their actions rather profound and very unique.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a0302fccc4&#038;e=20056c7556<\/p>\n<p>58% of orgs have no controls in place to prevent insider threats<br \/>\nMore than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization has experienced an insider attack at all, according to a new survey of more than 500 cybersecurity professionals.<br \/>\nThe Insider Threat Spotlight Report also found that nearly half of those surveyed have seen an increase in insider attacks over the last 12 months.<br \/>\nInadvertent data breaches (71 percent) top the list of insider threats companies care most about.<br \/>\nNegligent data (68 percent) and malicious data (61 percent) breaches come in a close second and third.<br \/>\nThe biggest threat comes from privileged users, such as managers, with access to sensitive information, with 67 percent believing that the fact insiders have credentialed access makes insider attacks more difficult to prevent.<br \/>\nAccording to the survey, the endpoint is the most common launching point for an insider attack\u2014by a wide margin (58 percent more than the next most common launching point: mobile devices).<br \/>\nTracking file movement across the network is a critical component of a data security strategy, according to 75 percent of respondents, with 57 percent naming databases as the most vulnerable asset to an inside attack.<br \/>\nSurvey respondents also named three barriers to better insider threat management:<br \/>\n&#8211; Lack of training and expertise (60 percent)<br \/>\n&#8211; Insufficient budgets (50 percent)<br \/>\n&#8211; Lack of collaboration between departments (48 percent).<br \/>\nNotably, lack of collaboration is the barrier with the highest gain since the previous survey, moving up 10 percentage points.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=00c8e57e98&#038;e=20056c7556<\/p>\n<p>The four cybersecurity terms everyone is talking about at Black Hat<br \/>\nHere are four cybersecurity terms that are rooting many conversations, both on the expo floor and among experts and analysts in the briefing rooms:<br \/>\n&#8211; Behavior Baselining<br \/>\n&#8211; Active Response<br \/>\n&#8211; Security Analytics<br \/>\n&#8211; Public Key Cryptography<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=78826819ee&#038;e=20056c7556<\/p>\n<p>Obama officials seek industry input on revising cyber-incident response strategy<br \/>\nSeveral of the Obama administration&#8217;s top officials on cybersecurity policy are urging industry leaders to get involved in revising the government&#8217;s strategy for responding to major cyber attacks, noting that drafting of the new plan has already begun and that a proposed version will be out for public comment as early as September.<br \/>\nThe revised cyber-response plan is being developed under Presidential Policy Directive 41 issued last week to address \u201csignificant incidents,\u201d a point that was stressed by White House&#8230;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e307a95513&#038;e=20056c7556<\/p>\n<p>* Best practices in cyber vulnerability assessment<br \/>\n* Are Healthcare CISOs Suffering from Cybersecurity Solution Fatigue? An Expert Probes Some of the Issues<br \/>\n* Will Faster Payments Mean Faster Fraud?<br \/>\n* Accenture : Data theft, malware infection big threat to digital businesses<br \/>\n* Ponemon Institute: External Cyber Attacks Cost Enterprises $3.5M\/year, 79% of Businesses Lack Comprehensive Strategies to Manage these Risks<br \/>\n* 2016 Malware Levels Now Stand at Nearly Four Times 2015 Totals<br \/>\n* Twitter Hacking and Social Media\u2019s Risk to Executive Security<br \/>\n* Beyond Data: Why CISOs Must Pay Attention To Physical Security<br \/>\n* $2.7 Million HIPAA Penalty for Two Smaller Breaches<br \/>\n* Using compliance as a tool for change<br \/>\n* In the Breach War, File Protection Is Just as Important as Data<br \/>\n* Data security and breach notification in Finland<br \/>\n* ISO compliance in the cloud: Why should you care, and what do you need to know?<br \/>\n* Federal Privacy Commissioner Provides Submission on New Data Breach Notification and Reporting Regulations<br \/>\n* Breach notification reporting can be complicated without proper skills, tools<br \/>\n* Banks must do better on cyber security: KPMG<br \/>\n* Australia gets one-quarter of a minister for national infosec<br \/>\n* The Case for Continuous Security Monitoring<br \/>\n* Arbor Networks Releases Global DDoS Attack Data for 1H 2016<br \/>\n* 5 Best Practices for Outsourcing Cybersecurity<br \/>\n* Most CISOs and CIOs need better resources to mitigate threats<\/p>\n<p>Best practices in cyber vulnerability assessment<br \/>\nHere are the best practices for cyber vulnerability assessment.<br \/>\nFirst and foremost you should have a very clear understanding of why you need a cyber vulnerability assessment.<br \/>\nResearch other companies in your industry.<br \/>\nTo know exactly which parts of your business structure need an assessment, you need to research your company\u2019s processes with a focus on the systems that are critical to keeping your business running.<br \/>\nOnce you\u2019ve identified the systems that need an assessment, you should rank them according to both their importance to your overall business model and to the sensitivity of the information they contain.<br \/>\nNow that you know exactly which systems and software need an assessment and how they rank in terms of priority, you should make sure you\u2019re aware of the security systems you already have in place.<br \/>\nf you\u2019ve completely mapped out both your vulnerabilities and your already-in-place security, and your inter-departmental security task force is in agreement on what\u2019s needed, you\u2019re ready to perform your vulnerability scans.<br \/>\nf you did your homework on what you needed to assess and also on the vulnerability assessment tool you chose, then you should fully trust the results of your cyber vulnerability assessment and act on them.<br \/>\nDon\u2019t wait.<br \/>\nDon\u2019t second guess.<br \/>\nThe assessment will produce recommendations for remediation that you should act on right now.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28bcaef55c&#038;e=20056c7556<\/p>\n<p>Are Healthcare CISOs Suffering from Cybersecurity Solution Fatigue? An Expert Probes Some of the Issues<br \/>\nA recent Institute for Critical Infrastructure Technology report provided some intriguing thoughts about the pressure facing chief information security officers (CISOs) to keep their organizations secure and how they are combating information and vendor solution overload.<br \/>\n\u201cDue to the plague of APTs, malware, ransomware and other malicious initiatives by invisible adversaries, few C-level executive positions are as critical as the CISO,\u201d Scott writes.<br \/>\nIn a recent report, James Scott, a senior fellow at the Institute for Critical Infrastructure Technology (ICIT), a Washington, D.C.-based cybersecurity think tank, points out that a well-informed CISO can improve the engagement of the C-suite and improve the cyber posture of the organization.<br \/>\nWhile the report offers a cross-industry perspective of the CISO role and the challenge of vendor solution overload, the report author does spend moments focusing on healthcare organizations, specifically in a section detailing how CISOs can assess the return on investment of cybersecurity solutions.<br \/>\nThe report provides an interesting perspective about the need for CISOs to ignore the hype surrounding \u201csilver bullet\u201d solutions in order find the most effective cybersecurity solutions and strategies for their particular organizations, but at the same time, the report author also highlights the part that the vendor community plays in this problem.<br \/>\n\u201cIn many cases, CISOs operate under the unrealistic expectation that they should be able to prevent every breach with a finite budget.<br \/>\nThey are expected to have enough technical expertise to develop a strategy to protect the business and enough business acumen to convince the board to adopt that strategy because it aligns with the goals of the organization,\u201d he writes.<br \/>\nAnd, he asserts that modern CISOs tend to function more as Chief Information Risk Officers, managing the risk to data and technology.<br \/>\nAccording to the ICIT report, there is rapid burnout among CISOs, as the average turnover rate is 17 months.<br \/>\n\u201cVendor attempts to offer silver bullet solutions undermine the community at large and poisons the vendor-customer relationship.<br \/>\nThe culture promoting these inadequate solutions distracts CISOs, technical personnel and solution developers from the risks and threats in the threat landscape and it distracts them from designing the right solutions to address the market needs.\u201d<br \/>\nIn the report, the author offers strategic recommendations for calculating a cybersecurity solution\u2019s ROI and uses a healthcare organization as an example.<br \/>\nThe ROI of security solutions can be equated to the fiscal component of the impact that the organization would assume if an adversary exploited the vulnerability that the solution addresses, the author writes.<br \/>\nThe report concludes with statistics sourced from the Economist Intelligence Unit that indicates proactive CISO-led strategies can cut the success rate of cyber-breaches by more than 50 percent, hacking successes by 60 percent and ransomware infections by 47 percent.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=838c018415&#038;e=20056c7556<\/p>\n<p>Will Faster Payments Mean Faster Fraud?<br \/>\nCrowe contends that to ensure global payments interoperability, faster payments are a necessity.<br \/>\nThe U.S. will soon be at a competitive disadvantage if it does not enable faster payments, she argues.<br \/>\nParry says the most fundamental risk to payments is poor identity management.<br \/>\nAnd it&#8217;s a legitimate concern.<br \/>\nAfter all, poor identity management apparently enabled hackers to steal $81 million from the central bank of Bangladesh in February, as part of a fraudulent transaction that was approved by the Federal Reserve Bank of New York.<br \/>\nAnd in a real-time or near-real-time environment, once the money is gone, it&#8217;s gone.<br \/>\nUnlike in the United Kingdom, Australia and other economically advanced parts of the world, faster payments are not the norm in the U.S.<br \/>\nCrowe declined to touch the interchange issue. &#8220;Cost is not the No. 1 worry for the Fed when it comes to faster payments,&#8221; she noted during the summit.<br \/>\nThe top concern, she says, is &#8220;a faster process that is still secure for business.&#8221;<br \/>\nThe Secure Payments Task Force&#8217;s goals differ from the goals of the Faster Payments Task Force.<br \/>\nAnd the Secure Payments Task Force has identified four areas that must be addressed to ensure the ongoing security of the payments system in the U.S. going forward.<br \/>\nFaster payments will be part of that, but not all.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dc1567f2ea&#038;e=20056c7556<\/p>\n<p>Accenture : Data theft, malware infection big threat to digital businesses<br \/>\nThe new report from Accenture and HfS Research say that 69 percent of respondents experienced an attempted or successful theft or corruption of data by insiders during the prior 12 months, with media and technology organizations reporting the highest rate (77 percent).<br \/>\nThis insider risk will continue to be an issue, with security professionals&#8217; concerns over insider theft of corporate information alone rising by nearly two-thirds over the coming 12 to 18 months.<br \/>\nThe survey, &#8220;The State of Cyber security and Digital Trust 2016&#8242;&#8221;, was conducted by HfS Research on behalf of Accenture.<br \/>\nMore than 200 C-level security executives and other IT professionals were polled across a range of geographies and vertical industry sectors.<br \/>\nThe survey examined the current and future state of cyber security within the enterprise and the recommended steps to enable digital trust throughout the extended ecosystem.<br \/>\nThe findings indicate that there are significant gaps between talent supply and demand, a disconnect between security teams and management expectations, and considerable disparity between budget needs and actual budget realities.<br \/>\nDespite having advanced technology solutions, nearly half of all respondents (48 percent) indicate they are either strongly or critically concerned about insider data theft and malware infections (42 percent) in the next 12 to 18 months.<br \/>\nWhen asked about current funding and staffing levels some42 percent of respondents said they need more budget for hiring cyber security professionals and for training.<br \/>\nMore than half (54 percent) of respondents also indicated that their current employees are underprepared to prevent security breaches and the numbers are only slightly better when it comes to detecting (47 percent) and responding (45 percent) to incidents.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5d409f726c&#038;e=20056c7556<\/p>\n<p>Ponemon Institute: External Cyber Attacks Cost Enterprises $3.5M\/year, 79% of Businesses Lack Comprehensive Strategies to Manage these Risks<br \/>\nTORONTO&#8211;(BUSINESS WIRE)&#8211;Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff expertise and technology as a key reason that these attacks are unchecked, according to results from a new Ponemon Institute study sponsored by BrandProtect.<br \/>\nSeventy-nine percent of the IT and IT security practitioners polled indicated their defensive infrastructure to identify and mitigate those threats are either non-existent, ad hoc or inconsistently applied throughout the enterprise.<br \/>\nThe findings reveal that the companies represented in this research averaged more than one cyber attack per month and incurred annual costs of approximately $3.5 million because of these attacks.<br \/>\nThe report \u201cSecurity Beyond the Traditional Perimeter,\u201d sponsored by internet risk detection and mitigation expert BrandProtect, examined the threats, costs and responses of companies to external internet cyber attacks.<br \/>\nThese threats include executive impersonations, social engineering exploits, and branded attacks arising outside a company\u2019s traditional security perimeter.<br \/>\nSecurity professionals cited an acute need for expertise, technology, and external services to address their growing concerns about these external threats.<br \/>\nSome of the key findings include:<br \/>\n&#8211; Fifty-nine percent of respondents say the protection of intellectual property from external threats is essential or very important to the sustainability of their companies.<br \/>\n&#8211; External internet attacks are frequent and the financial costs of these attacks are significant.<br \/>\nRespondents in this study report they experienced an average of 32 material cyber attacks or slightly more than one per month, costing their companies an average $3.5 million annually.<br \/>\n&#8211; Seventy-nine percent of respondents described their security processes for internet and social media monitoring as non-existent (38 percent), ad hoc (23 percent) or inconsistently applied throughout the enterprise (18 percent).<br \/>\n&#8211; Sixty-four percent of security leaders (directors or higher) feel that they lack the tools and resources they need to monitor, sixty-two percent lack the tools and resources they need to analyze and understand, and sixty-eight percent lack the tools and resources they need to mitigate external threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ddcbb18977&#038;e=20056c7556<\/p>\n<p>2016 Malware Levels Now Stand at Nearly Four Times 2015 Totals<br \/>\nGULF BREEZE, Fla., July 19, 2016 (GLOBE NEWSWIRE) &#8212; via PRWEB &#8211; Necurs is back with a vengeance, according to the security research team at AppRiver.<br \/>\nIn its Q2 Global Security Report, the company notes that the infamous botnet&#8217;s return was one of the major reasons behind the escalation in malware activity&#8211;which clocked in at 4.2 billion malicious emails and 3.35 billion spam emails between April 1, 2016, and June 30, 2016.<br \/>\nFor the first time, the report also includes metrics from Web-borne threats, reporting an average of 43 million unique threats daily throughout the second quarter.<br \/>\nAppRiver&#8217;s security analyst team quarantined 4.2 billion emails containing malware in Q2, pointing to a continued increase in malware traffic this year and resulting in total of 6.6 billion emails quarantined during the first half of 2016.<br \/>\nFor comparison, analysts observed 1.7 billion emails containing malware during all of 2015.<br \/>\nRansomware levels, as predicted in the Q1 Global Security Report, have increased this quarter&#8211;and arguably pose the greatest threat to netizens.<br \/>\nAppRiver&#8217;s security researches predict that the massive volume of malware isn&#8217;t likely to subside anytime soon.<br \/>\nWith the likes of Locky and Zepto kidnapping users&#8217; files until they pay a ransom, malware&#8211;especially ransomware&#8211;has become a business of its own.<br \/>\nThe popular channels that malware, like ransomware, travel through include obfuscated JavaScript, malicious macros, and OLEs (Object Linking and Embedding).<br \/>\nFifty-five percent of spam and malware traffic originated in North America, with Europe coming in second place.<br \/>\nAdditionally, AppRiver&#8217;s SecureSurf\u2122 Web filtering detected a spike in phishing attempts in June.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=35665b2aeb&#038;e=20056c7556<\/p>\n<p>Twitter Hacking and Social Media\u2019s Risk to Executive Security<br \/>\nThe use of social media as a means for targeting victims \u2013 whether through phishing or social engineering scams \u2013 is nothing new.<br \/>\nHowever, i<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * How Cybercrime Has Changed (Infographic) * The modern look of a utility&#8217;s chief security officer * Cyber security slated to become standalone&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2501","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2501"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2501\/revisions"}],"predecessor-version":[{"id":4988,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2501\/revisions\/4988"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}