Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
The Transportation Security Administration checkpoint at Albany International Airport is now using new technology that confirms the validity of a traveler’s identification and confirms their flight information in near real time. This technology will enhance detection capabilities for identifying fraudulent documents at the security checkpoint.
Travel has been limited to prevent the spread of COVID-19; however, as restrictions relax and organizations start to return to operations, we’re beginning to see an increase in business travel. In fact, in May, Business Travel News estimated that 31% of travelers expected to start planning business travel within the next month and 50% of meeting planners anticipated resuming meetings from the months of June to September.
The report, Death on the Job: The Toll of Neglect by the American Federation of Labor and Congress of Industrial Organizations (AFL–CIO), features state and federal data on worker fatalities, injuries and illnesses, as well as worker protections. In particular, the report examines some of the industries and workers most affected by the pandemic. In addition, it found that workplace violence is the second leading cause of occupational fatalities.
Thycotic, provider of privileged access management (PAM) solutions, released its CISO Decisions survey. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months.
As security professionals around the globe are involved in their organization’s COVID-19 response, many security staff are contemplating how to assess their protocols and procedures, as well as what new protocols and procedures to put in place. How can security technologies be a part of the overall COVID-19 response for an enterprise and how can security professionals use technology now that will serve them well in the future with continued enterprise risk mitigation?
Independent polling firm Schoen Cooperman Research recently conducted a nationwide poll on Americans’ views of facial recognition technology. The survey of 1,000 adults found that most Americans support the use of facial recognition across a wide range of applications with 75% supporting facial recognition technology at airports.
Skyfire Consulting, a public safety UAS consulting group, announced the appointment of Michael Briant as Chief Security Officer (CSO) and Michael Rogers as Director of Public Safety. Both will team up and bring their experience to the Skyfire Academy, as they lead a robust training programs in the industry.
The Department of Justice announced that six men have been arrested and charged federally with conspiring to kidnap the Governor of Michigan, Gretchen Whitmer. According to a complaint, this group used operational security measures, including communicating by encrypted messaging platforms and used code words and phrases in an attempt to avoid detection by law enforcement.
Security professionals want functionality like data encryption and VPN to be permanently enabled. Some have taken the approach of completely disabling the insertion of USB devices. This needs to be supported with more fine-grained control. What is the path forward?
Amid ever-changing technology, embracing modern security solutions and capabilities can be a challenge for many, especially those who have spent years accustomed to tried-and-true products, like the traditional keyed padlock. Today, decision makers working in the security sector are tasked with sorting through the blitz of new technology offerings and introductions.
The University of Florida Police Department is installing license plate recognition technology on campus and will partner with the Gainesville Police Department and Alachua County Sheriff’s Office that is currently using the technology to share information for aiding in investigations, responding to incidents, etc.
While we may not all have time to get in a round at the golf course while bringing business back up to speed, here are some lessons golf can teach us about preventing burnout, a subject that particularly affects so many security professionals.
Previously, school districts dealt with securing their systems at both the district and school level. But now, teaching, learning and working are all happening at home simultaneously. It’s messy, far more complicated, and gives our cyber and IT teams significantly less control over networks and security than there was when traditional in-school learning was the norm. It’s especially crucial we keep our security measures tight, even if it feels like an uphill battle.
SB 785 passed this week in the Senate and includes programs for post-traumatic growth, access to alternative therapies, as well as a grant of up $750K going to state and local organizations that provide suicide prevention services to veterans and their families.
No matter how much the economic situation changes, prompt detection and response to cyber threats must remain a core priority for your organization. The ability to spot and address incidents in their early stages will help you avoid data breaches and their unpleasant consequences, including business downtime, lost revenue, costly security investigations and fines from regulatory bodies. As a result, you can save your budget for mission-critical tasks that will bring your organization value in the long run.