A recent survey conducted by Ipsos reported that more than half of all C-suite executives (C-Suites) (53%) and nearly 3 in 10 Small Business Owners (SBOs) (28%) who suffered a breach in 2019 identified human error or accidental loss by an external vendor/source as the cause of the data breach.
From the dawn of the industrial revolution to just a few years ago, the basic model of manufacturing businesses barely changed at its core. Now, the game is completely different in a world that is increasingly technology and automation dependent. The digital revolution has disrupted many industries and manufacturing is no different. There has been significant transformation across the entire manufacturing value chain, from research and development, supply chain, and factory operations to marketing and sales; leading to significant gains in efficiency and productivity.
FUN. ENGAGING. MEMORABLE.
As internet security infrastructure becomes smarter and more difficult to penetrate, hackers have made the migration toward phishing attacks as the cyber-criminal weapon of choice because they exploit the seeming weakest part of any security system – humans!
If you have ever filled out a complete profile on LinkedIn (because you wanted to reach that 100% on the profile completeness) or finished a never-ending survey because you were promised a prize at the end, you’ve been gamified.
In our data-driven world, most organisations are at least partially dependent on a measure of electronic storage and networking. Perhaps out of experience, large organisations are generally aware of the need for effective cyber security frameworks including firewalls, access and awareness training, and anti-malware systems. Educational institutions, however, tend to be somewhat behind the curve, when it comes to tightly securing their data-verse. Recently, ethical hackers while testing the computer security of university networks discovered that they were able to successfully breach networks in less than 2 hours by using spear-phishing attacks to gain access to sensitive information. Well over 50 universities across the UK were a part of the test and in almost every case, testers were able to acquire domain-level administrator access used to control systems and gain complete unauthorised access to system information.
EU member states are now covered by the General Data Protection Regulation (GDPR) which is basically a law that protects the personal information of individuals within the EU and how they are used. GDPR is important for organisations around the world because it affects everyone who does business or communicates with individuals in the EU member countries. It is arguably the most important government regulation on data protection and data privacy rights in the last 20 years.
Everything has a cost, and that does not exclude free public WiFi connections.
Some weeks ago, there was an attempted hack into the phone contact list and emails of some UK MPs. This prompted the deputy chief whip Christopher Pincher to issue a warning to his colleagues, imploring them to;“Please be wary of texts and/or emails purporting to come from colleagues asking you to provide overseas contact details and/or asking you to download a secure message app.”