Facebook Privacy Issues – How the Recent Controversy Affects You

CybeRiskBlog, Cybersecurity

Facebook Privacy Issues

Given the amount of negative publicity and bad blood that’s been generated in the past few months surrounding Facebook privacy issues, the powers that be at Facebook must be worried about the future of the social media giant. Scandals like the Cambridge Analytica affair – where Facebook was co-opted by a data-gathering agency with a mission to misuse the information it collected to spread fake news and influence US political processes – have unmasked some of Facebook’s less than savory practices regarding data-sharing, and its standards for vetting and displaying online content. Facebook’s too cozy relationship with advertisers has also come into the negative spotlight, prompting users worldwide to seek ways around location and ad-tracking – all the while pressing … Read More

Top 10 Cyber Security Trends for 2018

CybeRiskBlog, Cybersecurity

cyber security trends

2017 was once again a turbulent period for the cyber security sector. Data breaches affecting the health-care sector and over half the population of the United States, the co-opting of hundreds of thousands of Internet of Things (IoT) devices in massive Distributed Denial of Service (DDoS) attacks, and the emergence of ransomware as an enduring threat and money-spinner for cyber-criminal networks were just some of the developments seen over the past twelve months. As the holiday season approaches and the year draws to a close, it’s time to put the spotlight on the Top Cyber Security Trends and the issues and threats likely to feature prominently in the information security landscape for 2018. Top 10 Cyber Security Trends for 2018 … Read More

General Data Protection Regulation or GDPR

CybeRiskBlog, Cybersecurity

GDPR

With information having developed into an asset equal to or even more valuable than conventional currencies, organizations across the globe are engaged in an ongoing race to acquire and exploit more data – often with little regard for the people that they’re collecting this information from. In an effort to strengthen up and unify legislation regarding online privacy, consumer rights, and data protection across the continent, officials of the European Union (EU) approved a draft proposal covering over 90 articles on customer data collection and security on April 27, 2016, with the aim of improving customer privacy for European citizens. This new EU privacy policy was formalized as the General Data Protection Regulation (GDPR), which was issued in May 2016 … Read More

The Chief Information Security Officer – What Role Does the CISO Play Today?

CybeRiskBlog, Cybersecurity

Chief Information Security Officer

With a job title as varied as the organizations which define it – chief security officer (CSO), security manager, chief security architect, information security manager, or corporate security officer, to name a few – today’s Chief Information Security Officer (CISO) is also increasingly called upon to wear an alternating series of hats, in negotiating the intricate web of enterprise security and corporate hierarchy. While overseeing the policies, tools, and practices that safeguard enterprise cyber-security, the CISO is simultaneously required to speak the language and enact the practices of the business arena. So anyone occupying this position must tread a wary and complex path, in order to fulfill their remit. As so much hinges on a successful tenure for the CISO … Read More

Financial Sector Cybersecurity – Does Regulatory Compliance mean we are secure?

CybeRiskBlog, Cybersecurity

financial sector cybersecurity

Simply in terms of good business practice, banks and other institutions in the financial sector have an obligation to safeguard the privacy and information of their customers, protect their assets, and provide restitution in cases where it’s justified. But throughout the world, these obligations are also enshrined in law and enforced through various sets of legal and procedural guidelines, criteria and specifications for regulatory compliance, and fines or penalties for deviating from any of these. The laws and compliance regimes for financial sector cybersecurity may be in place – and financial institutions may be taking steps to meet all of the conditions they lay down – but it’s open to debate whether simply adhering to the demands of regulatory compliance … Read More

How to Secure Against Mobile Phone Threats

CybeRiskBlog, Cybersecurity

Already, cyber-crime has moved beyond the desktop and corporate network to the world of mobile devices. And with well over 30% of the global population expected to own a smartphone or tablet by 2017 – and some 38% of mobile users having admitted to being the victim of some form of attack in the years since 2013 – mobile phone threats are set to grow and grow. Although certain mobile threat vectors are still in the early stages of their evolution, the coming years should see a huge demand for defensive and remedial products from security vendors, and for expertise and guidance from security professionals. So in this article, we’ll consider the major threats currently facing mobile users, and some … Read More

The Necessity of Micro-Segmentation in Network Security

CybeRiskBlog, Cybersecurity

From its conceptual basis of dividing a system into extremely small parts, micro-segmentation has value in a number of areas – and applications in several sectors including social media management, customer data analysis, and digital marketing. But it’s the use of the principle in ensuring network and data security which makes micro-segmentation such an appealing prospect for infosec professionals. Using Micro-Segmentation to Avoid Network Collisions Under normal conditions, data packets originating from a variety of sources are continually moving through a network. With the huge numbers of packets typically involved, there’s plenty of scope for them to collide – and the logical areas in which this occurs are known as collision domains. Collisions will occur when two or more devices … Read More