<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Security | OrgLeader, LLC</title>
	<atom:link href="https://www.orgleader.com/tag/information-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.orgleader.com</link>
	<description>Optimizing Leaders and Organizations</description>
	<lastBuildDate>Mon, 10 Jan 2022 02:22:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.11</generator>
	<item>
		<title>Passwords Are Past Their Prime</title>
		<link>https://www.orgleader.com/passwords-are-past-their-prime/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=passwords-are-past-their-prime</link>
					<comments>https://www.orgleader.com/passwords-are-past-their-prime/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Wed, 03 Nov 2021 09:00:13 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=4496</guid>

					<description><![CDATA[How confident are you that passwords are enough to protect your data as a consumer? Michael Nadeau, senior editor at CSO magazine, believes the best thing you can say about using a password for authentication is that it’s better than nothing. High-profile breaches like Equifax, however, have exposed millions of passwords and user IDs, calling [...]]]></description>
										<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-4497" src="https://www.orgleader.com/wp-content/uploads/Password-Pixabay-1024x724.jpg" alt="" width="1024" height="724" srcset="https://www.orgleader.com/wp-content/uploads/Password-Pixabay-200x141.jpg 200w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-300x212.jpg 300w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-400x283.jpg 400w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-500x354.jpg 500w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-600x424.jpg 600w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-700x495.jpg 700w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-768x543.jpg 768w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-800x566.jpg 800w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-1024x724.jpg 1024w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay-1200x848.jpg 1200w, https://www.orgleader.com/wp-content/uploads/Password-Pixabay.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>How confident are you that passwords are enough to protect your data as a consumer? <a href="https://www.csoonline.com/article/3237827/password-security/ready-for-more-secure-authentication-try-these-password-alternatives-and-enhancements.html" target="_blank" rel="noopener noreferrer">Michael Nadeau</a>, senior editor at CSO magazine, believes the best thing you can say about using a password for authentication is that it’s better than nothing. High-profile breaches like Equifax, however, have exposed millions of passwords and user IDs, calling into question even that faint praise. Consumers should assume that at least some of their passwords have been compromised. Otherwise, they create a dangerous false sense of security.</p>
<p>If you’re still not convinced about the seriousness of password vulnerabilities, consider these points from the <a href="https://www.verizonenterprise.com/verizon-insights-lab/dbir/" target="_blank" rel="noopener noreferrer">Verizon Data Breach Investigations Report</a>:</p>
<ul>
<li>Hacking still accounts for the largest percentage of data breaches.</li>
<li>Eighty-one percent of hacking-related breaches involved either stolen or weak passwords.</li>
</ul>
<p>Password-only protection is permanently broken, and any organization relying on it is placing its business and reputation at risk. Even if they avoid a breach, awareness of the shortcomings of password protection is much higher now thanks to Equifax. If that’s how you protect customers’ data, they will think twice about trusting you with it.</p>
<h4>Authentication Alternatives</h4>
<p>Alternatives like two-factor authentication (2FA), multifactor authentication (MFA), behavioral analytics, and biometrics have been available for some time, but adoption rates are low. The growing threat of breaches and consumer awareness is lowering barriers to implementing these options — primary barriers being user resistance, complexity and ROI.</p>
<p>All these alternatives can be compromised, some more easily than others. Dustin Heywood, senior managing consultant for IBM’s X-Force Red security testing team, shared that all authentication (such as a fingerprint, a face, an iris scan) are broken down into bits and bytes, and they are basically a “shared secret.” Because these shared secrets are stored digitally like a password, it is theoretically possible to steal them. The difference is that it’s harder to do so.</p>
<p>The goal is to make it so difficult to gain access that most cybercriminals will look elsewhere for easier pickings. Many companies use a combination of authentication methods depending on the risk, user considerations and value of the data being protected to reach a reasonable expectation of security.</p>
<p>While consumers might be more accepting of more complex authentication to protect health and financial data due to recent high-profile breaches, not all service providers offer the option. “A lot of banks, because of work that was done quite some time ago, think that having security questions tied to an account is a second factor, which it really isn’t,” says independent security researcher Jessy Irwin. “People want an extra layer of protection, and don’t have the option to turn anything on. They have to go to customer service or an account representative or up a chain to even ask for these features.”</p>
<p>Robert Block, senior vice president at intelligence-based authentication provider SecureAuth, thinks the challenge of implementing stronger authentication is not with the technology. It is about getting decision makers to determine the level of acceptable risk, the number of factors to support and the way to present those factors to the end user.</p>
<p>Whether it is a smartphone or something else, requiring ownership of a device for access limits the damage a cybercriminal can do. Harry Sverdlove, co-founder/CTO of Edgewise Networks, believes the most reliable scheme would require something users know (password, answers to security questions), something they have (smartphone, token device), their location, and something they are (biometrics, behavioral analytics).</p>
<p>If you want your data as a consumer to be better protected, companies need to think beyond passwords. Creating more obstacles for a cybercriminal makes it more likely this individual will move on to another target.</p>
<p>________________________</p>
<p><a href="http://www.ryanlahti.com" target="_blank" rel="noopener noreferrer">Ryan Lahti</a> is the managing principal of <a href="http://www.orgleader.com/" target="_blank" rel="noopener noreferrer">OrgLeader</a> and author of <a href="https://www.orgleader.com/finesse/finesse-factor/" target="_blank" rel="noopener noreferrer"><em>The Finesse Factor</em></a>. Stay up to date on Ryan&#8217;s STEM organization tweets here: <a href="https://twitter.com/RyanLahti" target="_blank" rel="noopener noreferrer">@ryanlahti</a></p>
<p><a href="https://www.orgleader.com/finesse/finesse-factor/" target="_blank" rel="noopener noreferrer"><img class="aligncenter wp-image-4596 size-medium" title="The Finesse Factor by Ryan Lahti" src="https://www.orgleader.com/wp-content/uploads/finesse-book-1-300x233.jpg" alt="The Finesse Factor by Ryan Lahti" width="300" height="233" srcset="https://www.orgleader.com/wp-content/uploads/finesse-book-1-200x156.jpg 200w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-300x233.jpg 300w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-400x311.jpg 400w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-500x389.jpg 500w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-600x467.jpg 600w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-700x544.jpg 700w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-768x597.jpg 768w, https://www.orgleader.com/wp-content/uploads/finesse-book-1-800x622.jpg 800w, https://www.orgleader.com/wp-content/uploads/finesse-book-1.jpg 900w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>(Photo: <a href="https://pixabay.com/photo-397653/" target="_blank" rel="noopener noreferrer">Password</a>, Pixabay)</p>The post <a href="https://www.orgleader.com/passwords-are-past-their-prime/">Passwords Are Past Their Prime</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/passwords-are-past-their-prime/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Responding to the Ransomware Risk</title>
		<link>https://www.orgleader.com/ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware</link>
					<comments>https://www.orgleader.com/ransomware/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 16 Feb 2017 09:00:27 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=2978</guid>

					<description><![CDATA[What do you do if you are the victim of ransomware? For several years, the FBI has recommended that you do not pay when malicious software is used to encrypt or otherwise hold data hostage until a payment is made (a.k.a. ransomware), according to CSO. This position was forcefully echoed by one of the nation’s [...]]]></description>
										<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-2981" src="/wp-content/uploads/2017/02/Cryptolocker-ransomware-Flickr.jpg" alt="Cryptolocker ransomware - Flickr" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr-200x112.jpg 200w, https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr-300x168.jpg 300w, https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr-400x224.jpg 400w, https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr-500x280.jpg 500w, https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr-600x337.jpg 600w, https://www.orgleader.com/wp-content/uploads/Cryptolocker-ransomware-Flickr.jpg 640w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>What do you do if you are the victim of ransomware? For several years, the FBI has recommended that you do not pay when malicious software is used to encrypt or otherwise hold data hostage until a payment is made (a.k.a. ransomware), according to <a href="http://www.csoonline.com/article/3168931/data-breach/to-pay-or-not-to-pay-too-many-victims-say-yes-to-ransomware.html" target="_blank">CSO</a>. This position was forcefully echoed by one of the nation’s highest-profile security bloggers – <a href="https://krebsonsecurity.com/2016/12/before-you-pay-that-ransomware-demand/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29" target="_blank">Brian Krebs</a> – in a recent post.</p>
<p>Unfortunately, this advice has not always been followed. The <a href="https://www.carbonite.com/globalassets/files-white-papers/ransomware-report.pdf" target="_blank">Ponemon Institute</a> reported in a recent study that 48 percent of businesses victimized by ransomware said they paid.</p>
<p>The reality is that the success of ransomware isn’t just increasing. It’s exploding. According to the FBI, the collective amount of ransoms paid in all of 2015 in the U.S. was $24 million. Gartner shared at its <a href="http://www.gartner.com/events/na/security" target="_blank">2016 Security &amp; Risk Summit</a> that ransomware is likely to have netted organized cybercrime more than $1 billion in 2016.</p>
<p>The problem is likely worse than the findings. The FBI said many victims don’t report it, “for a number of reasons, including concerns over not knowing where and to whom to report; not feeling their loss warrants law enforcement attention; concerns over privacy, business reputation, or regulatory data breach reporting requirements; or embarrassment.”</p>
<p>The reasons for ransomware’s attractiveness to cyber criminals are not complicated. It doesn’t take all that much expertise – it has been widely reported that it is easy for so-called “script kiddies” to buy or lease the malware on the <a href="http://csoonline.com/article/2137223/data-protection/dark-web--an-ever-more-comfortable-haven-for-cyber-criminals.html" target="_blank">Dark Web</a>.</p>
<p>A <a href="http://csoonline.com/article/3074431/data-breach/tricks-that-ransomware-uses-to-fool-you.html" target="_blank">ransomware attack</a> is potentially more damaging than a data breach, especially to a business. No organization wants its data stolen, but it can continue to function after it discovers a breach. If all of its data are encrypted and it doesn’t have a backup, it can’t function.</p>
<p>As a <a href="http://icitech.org/wp-content/uploads/2016/03/ICIT-Brief-The-Ransomware-Report2.pdf" target="_blank">white paper</a> by the Institute for Critical Infrastructure Technology (ICIT) noted, the ransom demanded is generally not a crippling amount. For individuals, it tends to be a few hundred dollars in Bitcoin. “From law enforcement’s perspective, a home burglary results in greater loss than a singular ransomware attack,” the report said, which means law enforcement will rarely devote “significant resources” to investigating it.</p>
<p>According to a recent <a href="https://www.justice.gov/criminal-ccips/file/872771/download" target="_blank">U.S. Government report</a>, there have been approximately 4,000 ransomware attacks per day in 2016– a dramatic increase over the 1,000 attacks per day reported in 2015. Compared to today’s payment of about 2 Bitcoins or $670 daily, the report estimates the average ransom will substantially increase to be $300,000 per day.</p>
<p>According to ICIT, Joseph Bonavolonta, the Boston-based head of the FBI&#8217;s CYBER and Counterintelligence Program, got into trouble with Sen. Ron Wyden (D-Ore.) in October 2015 when he said, &#8220;To be honest, we often advise people just to pay the ransom.&#8221;</p>
<p>After Wyden complained, the FBI “clarified” that its position was, “only to pay the ransom if mitigation steps failed and the only other option was to lose the files.” Those factors, which all contribute to the success rate of ransomware attacks, are some of the same reasons victims are motivated to pay – they are desperate to recover their files, and they can afford the price more easily than they can afford to lose their files.</p>
<p>Of course, there is plenty of logic behind the FBI’s arguments as well. The primary one is that paying simply makes the problem greater – the more criminals make, the more they will attack.</p>
<p>The bureau and others also note that there is no guarantee that criminals will produce an encryption key once the ransom is paid, or get rid of the malware on the device, meaning a victim could get victimized again.</p>
<p>Krebs said victims do have options, even if they don’t have a current backup. He recommended contacting two websites – <a href="https://www.nomoreransom.org/" target="_blank">No More Ransom</a> and <a href="https://www.bleepingcomputer.com/" target="_blank">Bleeping Computer</a> – which provide free solutions to at least some ransomware variants.</p>
<p>Krebs said No More Ransom, which is backed by security firms and cybersecurity organizations in 22 countries, had saved 6,000 victims of ransomware more than $2 million by December 2016.</p>
<p>But that statistic, say other experts, shows that while it is a laudable initiative, it is unlikely to slow the explosive growth of ransomware – $2 million is barely a rounding error in the total being collected by cyber criminals.</p>
<p>Stu Sjouwerman, CEO of KnowBe4 explained that the decision not to pay is not always that easy. He said it comes down to a cost/benefit calculation. “It becomes a no-brainer if you are faced with a failed backup and more than a month of lost data that could shut you down.”</p>
<p>Ed Cabrera, chief cybersecurity officer at Trend Micro, also noted the divide between what should happen and what does happen. “The consensus is clear that paying ‘should’ never be an option,” he said. “However, as companies fail to plan, they are planning to fail when it comes to ransomware attacks. This is obviously a very lucrative business in the Deep Web and is only going to continue evolving to different file types and systems that are very important to companies and consumers.”</p>
<p>Given the previous statistics, it is apparent that many organizations are failing to plan. CSO sees this as puzzling, because ways to prevent ransomware are reasonably straightforward and widely publicized, including on the FBI website. The most important thing is to back up data regularly, and secure the backups – don’t leave them connected to the computers and networks they are backing up – so they can’t also be infected by an attack.</p>
<p>Krebs has his own Three Rules of Online Security:</p>
<ol>
<li>If you didn’t go looking for it, don’t install it.</li>
<li>If you installed it, update it.</li>
<li>If you no longer need it (or, if it’s become too big of a security risk) get rid of it.</li>
</ol>
<p>Ransomware is an increasing risk. If your organization has not already taken precautions, it is at least worth putting it on the agenda for your next security meeting.</p>
<p><em>_________</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>
<p>(Photo: <a href="https://goo.gl/images/48XJ5W" target="_blank">Cryptolocker ransomware</a>, Flickr)</p>The post <a href="https://www.orgleader.com/ransomware/">Responding to the Ransomware Risk</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Enlightenment for CEOs</title>
		<link>https://www.orgleader.com/cybersecurity-ceos/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-ceos</link>
					<comments>https://www.orgleader.com/cybersecurity-ceos/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 16 Jun 2016 09:00:54 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=2397</guid>

					<description><![CDATA[More than 90 percent of corporate executives say they can’t read a cybersecurity report and are not prepared to handle a major attack according to a report from Nasdaq and Tanium — an endpoint security and systems management vendor out of Emeryville, California. The report, which can be seen in a CNBC video, highlights a training opportunity [...]]]></description>
										<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-2398" src="/wp-content/uploads/2016/06/Cybersecurity-Flickr.jpg" alt="Cybersecurity - Flickr" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr-200x133.jpg 200w, https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr-300x199.jpg 300w, https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr-400x266.jpg 400w, https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr-500x332.jpg 500w, https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr-600x398.jpg 600w, https://www.orgleader.com/wp-content/uploads/Cybersecurity-Flickr.jpg 640w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>More than 90 percent of corporate executives say they can’t read a cybersecurity report and are not prepared to handle a major attack according to a <a href="http://video.cnbc.com/gallery/?video=3000506270" target="_blank">report</a> from Nasdaq and Tanium — an endpoint security and systems management vendor out of Emeryville, California. The report, which can be seen in a CNBC video, highlights a training opportunity for CEOs on cybersecurity.</p>
<p>In a recent <a href="http://www.forbes.com/sites/stevemorgan/2016/05/04/why-ceos-are-failing-cybersecurity-and-how-to-help-them-get-passing-grades/#45af5c95553b" target="_blank">Forbes article</a>, Steve Morgan reiterates the fact that cybercrime is on the rise, but a lot of information about it is geared more toward those in the information security field. For example, the <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/" target="_blank">Verizon 2016 Data Breach Investigations Report</a> (DBIR) states that no location, industry or organization is immune from attack. A DBIR executive summary — described as the C-level guide to what they need to know — is full of information that will sound convoluted to most CEOs. For instance, &#8220;the median traffic of a DoS attack is 1.89 million packets per second — that’s like over 113 million people trying to access your server every minute.&#8221;</p>
<p>Make no mistake, Verizon’s report is an invaluable resource and recommended reading for business leaders. A skim through is certain to heighten awareness around cyber risks — even if it leaves a CEO scratching her head trying to figure out what all the technical terms mean — including patching, change monitoring, SLAs for DoS mitigation, CMS plugins, two-factor authentication, tamper evident controls, and all the rest.</p>
<p>Amjed Saffarini, CEO of <a href="https://www.cybervistainc.com/" target="_blank">Cybervista</a> (a cybersecurity training company), spoke at the <a href="http://cyberinvestingsummit.com/" target="_blank">Cyber Investing Summit</a> and explained that C-suite executives and board members need to be educated on cybersecurity or the cyber damage will only get worse. While CEOs may be receptive to the notion of learning about cyber, their biggest challenges are setting aside the learning time and finding training programs geared specifically to their needs.</p>
<p>Saffarini said that he knew absolutely nothing about cybersecurity a year ago. Now he’s a subject matter expert on cyber workforce issues. Saffarini said there are two main ingredients for educating CEOs whether it’s a Cybervista program or something else. First, everything needs to be broken down into plain language and business terms that resonate with a CEO. Second, it needs to be delivered in bite-sized chunks — 15 or 20 minutes at a time — so it can realistically be worked into a CEO’s busy schedule.</p>
<p>As CEOs become more savvy on cybersecurity topics, it will help to drive home the point that cybersecurity is a key element in corporate risk management. Furthermore, sound cybersecurity will involve an investment of money in addition to time. As Brad Egeland explains in a <a href="http://www.cio.com/article/2984380/project-manager/5-things-your-ceo-should-know-about-cybersecurity.html" target="_blank">CIO</a> article, you need to fund security, not just put someone “on it.” If someone wants your data bad enough, they are likely to get it. Nonetheless, you need to do what you can to protect it for the sake of the business as well as the peace of mind of employees, executives and shareholders alike.</p>
<p>CEOs do not have to be cybersecurity experts. They need to be more cybersecurity enlightened. The first step is adjusting cybersecurity education to better fit the needs of CEOs.</p>
<p>Related posts:</p>
<p><a href="https://www.orgleader.com/cybersecurity-boardroom/" target="_blank">Cybersecurity in the Boardroom</a></p>
<p><em>&#8212;&#8212;&#8212;&#8211;</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>
<p>(Photo: <a href="https://www.flickr.com/photos/inl/3639507323/in/photolist-6xBqJg-7SUwMh-7SUx4W-7SRf6a-7SRfaH-7SUwRy-7SUwfL-7SRfo4-7SUwt7-7SUwBW-7SUwk9-7SReRF-7SUwWd-7SUwnm-7SRfkM-7SRfFK-7SUwyW-7SUwNW-7SReW2-7SUx13-7SUwb7-7SUwYG-7SUwDU-7SRfM4-kg8qkG-kg62FD-7SUwU9-7SRfqe-kg6GAk-kg6rqR-kg67T2-kg8oRj-kg6vdF-kg6tvn-kg66f2-kg6yja-kg8rFN-kg6Phg-kg6V22-kg6wGn-kg8F4Q-kg6Qxc-kg69xV-kg6TCk-nvNC6S-nvNC2K-nN173t-nNfbpu-nLfGFW-nvNDtb" target="_blank">Cybersecurity</a>, Flickr)</p>The post <a href="https://www.orgleader.com/cybersecurity-ceos/">Cybersecurity Enlightenment for CEOs</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/cybersecurity-ceos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Information Security in 2016</title>
		<link>https://www.orgleader.com/information-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=information-security</link>
					<comments>https://www.orgleader.com/information-security/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 14 Jan 2016 09:00:20 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=2154</guid>

					<description><![CDATA[In 2016, information security continues to be a critical topic for organizations of all types to address. In its 2016 Annual Security Report that discusses cybersecurity trends and threat intelligence, Cisco drives this point home. The report points out that only 45 percent of organizations worldwide are confident in their security measures as today’s cyber attackers [...]]]></description>
										<content:encoded><![CDATA[<p><img class="alignnone wp-image-2155" src="/wp-content/uploads/2016/01/Information-Security-1024x1024.jpg" alt="Security concept: Lock on digital screen" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Information-Security-66x66.jpg 66w, https://www.orgleader.com/wp-content/uploads/Information-Security-100x100.jpg 100w, https://www.orgleader.com/wp-content/uploads/Information-Security-150x150.jpg 150w, https://www.orgleader.com/wp-content/uploads/Information-Security-200x200.jpg 200w, https://www.orgleader.com/wp-content/uploads/Information-Security-300x300.jpg 300w, https://www.orgleader.com/wp-content/uploads/Information-Security-400x400.jpg 400w, https://www.orgleader.com/wp-content/uploads/Information-Security-500x500.jpg 500w, https://www.orgleader.com/wp-content/uploads/Information-Security-600x600.jpg 600w, https://www.orgleader.com/wp-content/uploads/Information-Security-700x700.jpg 700w, https://www.orgleader.com/wp-content/uploads/Information-Security-768x768.jpg 768w, https://www.orgleader.com/wp-content/uploads/Information-Security-800x800.jpg 800w, https://www.orgleader.com/wp-content/uploads/Information-Security-1024x1024.jpg 1024w, https://www.orgleader.com/wp-content/uploads/Information-Security-1200x1200.jpg 1200w, https://www.orgleader.com/wp-content/uploads/Information-Security.jpg 5001w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p class="wp-caption-dd">In 2016, information security continues to be a critical topic for organizations of all types to address. In its <em><a href="http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html?KeyCode=001031986&amp;_ga=1.225472537.203006426.1453492941" target="_blank">2016 Annual Security Report</a></em> that discusses cybersecurity trends and threat intelligence, <a href="http://www.cisco.com/" target="_blank">Cisco</a> drives this point home. The report points out that only 45 percent of organizations worldwide are confident in their security measures as today’s cyber attackers are more persistent in launching increasingly sophisticated campaigns. Although a large percentage of organizations appear to question their security capabilities, 92 percent of the executives agree that regulators and investors will expect companies to manage cybersecurity risk exposure which should place it high on their priority lists.</p>
<p>The Cisco report further identifies key factors that are contributing to the risk exposure. The factors include:</p>
<p><strong>Aging infrastructure:</strong> Between 2014 and 2015, the number of organizations that said their security infrastructure was up-to-date dropped by 10 percent. The survey discovered that 92 percent of Internet devices are running known vulnerabilities. Thirty-one percent of all devices analyzed are no longer supported or maintained by the vendor.</p>
<p><strong>Shifting server activity:</strong> Online criminals have shifted to compromised servers, such as those for WordPress, to support their attacks, leveraging social media platforms for nefarious purposes. For example, the number of WordPress domains used by criminals grew 221 percent between February and October 2015.</p>
<p><strong>Browser-based data leakage:</strong> While often viewed by security teams as a low-level threat, malicious browser extensions have been a potential source of major data leaks, affecting more than 85 percent of organizations. Adware, malvertising, and even common websites or obituary columns have led to breaches for those who do not regularly update their software.</p>
<p>While many organizations focus their attention on the security of customer data, IT security firm <a href="https://www.sophos.com/en-us.aspx" target="_blank">Sophos</a> explains in its report, <em><a href="https://www.sophos.com/en-us/medialibrary/Gated%20Assets/white%20papers/the-state-of-encryption-today-wpna.pdf?la=en" target="_blank">The State of Encryption Today</a></em>, that employee, company and cloud data are not protected to the same degree. After surveying 1700 IT decision makers in the U.S., Canada, India, Australia, Japan and Malayasia, Sophos made some eye-opening discoveries.</p>
<p>Thirty-one percent of the companies surveyed that store employee data admit that employee bank details are not always encrypted. Forty-three percent of the companies holding sensitive employee HR files don’t always encrypt them, and nearly half of those that store employee healthcare information (47 percent) fail to consistently encrypt these records.</p>
<p>“Data breaches happen to large and small companies every day, and the last line of defense against that breach turning into a corporate crisis is a comprehensive data encryption policy,” commented Dan Schiappa, senior vice president and general manager of Enduser Security at Sophos. “While it is the customer data breaches that hit the headlines, companies have the same obligation to protect sensitive employee data, and they should not overlook it.”</p>
<p>Company data remains at risk as well. Nearly one-third (30 percent) of all organizations surveyed fail to always encrypt their own corporate financial information, and nearly half (41 percent) inconsistently encrypt files containing valuable intellectual property.</p>
<p>Cloud data security is also an issue. More than eight in ten companies (84 percent) expressed concern about the safety of data stored in the cloud. Nonetheless, while 80 percent are using the cloud for storage, only 39 percent encrypt all files stored in the cloud.</p>
<p>Companies can do more to ensure information security, but so can employees. Even something as simple as passwords still need some work. SplashData announced the 2015 edition of its annual <a href="https://www.teamsid.com/worst-passwords-2015/" target="_blank">Worst Passwords List</a> that highlights the insecure password habits of Internet users, and “123456” and “password” once again are the most commonly used passwords. These passwords have held the top positions since SplashData’s first list in 2011. Although some new and longer passwords made their debut, the longer passwords are so simple that it makes their extra length virtually worthless as a security measure.</p>
<p>Given the findings from Cisco, Sophos and SplashData, it is clear that information security is an ongoing challenge for which all stakeholders from companies to employees can make improvements. Hopefully, the remainder of 2016 will bring more focused efforts to do so.</p>
<p><em>&#8212;&#8212;&#8212;&#8211;</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>
<p>(Photo: Dollar Photo Club)</p>The post <a href="https://www.orgleader.com/information-security/">Information Security in 2016</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/information-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Man in the Cloud Attacks on Box, Google Drive and Dropbox</title>
		<link>https://www.orgleader.com/man-in-the-cloud-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=man-in-the-cloud-attacks</link>
					<comments>https://www.orgleader.com/man-in-the-cloud-attacks/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 13 Aug 2015 09:00:16 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=1887</guid>

					<description><![CDATA[If your company uses cloud applications such as Box, Google Drive or Dropbox to make data available to multiple users and devices, then you should be aware of Man in the Cloud (MITC) cyber attacks. Imperva, a cyber security company based in northern California, described MITC as a new type of attack in its August [...]]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000; font-family: Calibri;"><img class="alignnone wp-image-1889" src="/wp-content/uploads/2015/08/Michelin-Man-in-the-Sky-Flickr.jpg" alt="Michelin Man in the Sky - Flickr" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr-200x133.jpg 200w, https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr-300x200.jpg 300w, https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr-400x266.jpg 400w, https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr-500x333.jpg 500w, https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr-600x399.jpg 600w, https://www.orgleader.com/wp-content/uploads/Michelin-Man-in-the-Sky-Flickr.jpg 640w" sizes="(max-width: 640px) 100vw, 640px" /></span></p>
<p><span style="color: #000000; font-family: Calibri;">If your company uses cloud applications such as Box, Google Drive or Dropbox to make data available to multiple users and devices, then you should be aware of Man in the Cloud (MITC) cyber attacks. <a href="http://www.imperva.com/" target="_blank">Imperva</a>, a cyber security company based in northern California, described MITC as a new type of attack in its </span><span style="color: #0000ff; font-family: Calibri;"><a href="http://www.imperva.com/docs/imperva_Hacker_Intelligence_Initiative_No22_Jul2015_v1d.pdf" target="_blank">August Hacker Intelligence Initiative Report</a></span><span style="color: #000000; font-family: Calibri;">. </span></p>
<p><span style="color: #000000; font-family: Calibri;">As <a href="http://www.securityweek.com/man-cloud-attacks-leverage-storage-services-steal-data" target="_blank">SecurityWeek</a></span><span style="color: #000000; font-family: Calibri;"> and <a href="http://www.pcmag.com/article2/0,2817,2489189,00.asp" target="_blank">PCMag</a> point out, MITC attackers can easily use Box or one of the other file synchronization services to control communication, gain remote access or extract data in a much simpler way. Attackers don’t have to steal a user’s account credentials or compromise the cloud provider’s servers. The attackers just have to access the file synchronization information on the user’s device which is usually stored in a file, registry or credential manager. According to experts, this information can easily be accessed and decrypted by attackers. The attackers can then synchronize their own devices with the victim’s account by copying the victim’s synchronization information to the right place on the attackers’ system. </span></p>
<p><span style="color: #000000; font-family: Calibri;">Incidentally, an MITC attack is different from attacks identified by similar names such as Man in the Middle (MITM) and Man in the Browser (MITB) attacks. An MITM attack is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. It’s a form of eavesdropping, but the entire conversation is controlled by the attacker who even has the ability to modify the content of each message. </span></p>
<p><span style="color: #000000; font-family: Calibri;">An MITB attack involves stealing login credentials, account numbers, and various other types of financial information. The attack combines the use of Trojan horses with a unique phishing approach that captures data as the user enters it. The user is completely unaware of that the data is being hijacked, because he or she is interacting with a legitimate site. </span></p>
<p><span style="color: #000000; font-family: Calibri;">Since MITC attacks are the newest forms of cyber threats, Imperva recommends that organizations protect themselves from MITC attacks in two ways. First, monitor access and usage of cloud services across the enterprise. Second, utilize controls such as data activity monitoring and file activity monitoring around business data resources to recognize abnormal and abusive access to critical data.</span></p>
<p><em>&#8212;&#8212;&#8212;&#8211;</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>
<p><span style="color: #000000; font-family: Calibri;">(Photo: <a href="https://flic.kr/p/5g7hV3" target="_blank">Michelin Man in the Sky</a>, Flickr)</span></p>The post <a href="https://www.orgleader.com/man-in-the-cloud-attacks/">Man in the Cloud Attacks on Box, Google Drive and Dropbox</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/man-in-the-cloud-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Internet of Things Deserves Your Attention</title>
		<link>https://www.orgleader.com/internet-of-things/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=internet-of-things</link>
					<comments>https://www.orgleader.com/internet-of-things/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 12 Mar 2015 09:00:41 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=1694</guid>

					<description><![CDATA[How much attention should be paid to the Internet of Things (IoT)? Some recent events in the last three months provide a compelling answer. Earlier this week, Forbes reported that global software developer SAP announced a list of new partnerships in order to get more involved in IoT. TechCrunch shared news today that Amazon acquired [...]]]></description>
										<content:encoded><![CDATA[<p><img class="aligncenter wp-image-1696 size-full" src="/wp-content/uploads/2015/03/Wearable-Technology-Flickr.jpg" alt="Wearable Technology - Flickr" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr-200x120.jpg 200w, https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr-300x180.jpg 300w, https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr-400x240.jpg 400w, https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr-500x300.jpg 500w, https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr-600x360.jpg 600w, https://www.orgleader.com/wp-content/uploads/Wearable-Technology-Flickr.jpg 640w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>How much attention should be paid to the Internet of Things (IoT)? Some recent events in the last three months provide a compelling answer. Earlier this week, <a href="http://www.forbes.com/sites/greatspeculations/2015/03/10/sap-prepares-to-take-on-the-internet-of-things-announces-string-of-new-partnerships/" target="_blank"><em>Forbes</em></a> reported that global software developer <a href="http://go.sap.com/index.html" target="_blank">SAP</a> announced a list of new partnerships in order to get more involved in IoT. <a href="http://techcrunch.com/2015/03/12/amazon-has-quietly-acquired-2lemetry-to-build-out-its-internet-of-things-strategy/" target="_blank">TechCrunch</a> shared news today that <a href="http://www.amazon.com/" target="_blank">Amazon</a> acquired 2lemetry, a startup based in Denver that has created a platform to track and manage IP-enabled machines and other connected devices.</p>
<p>Since IoT refers to devices that can be web-connected (e.g., thermostats, fitness bracelets, garage doors, refrigerators, TVs, industrial machinery and building alarm systems) even Congress has taken notice. In February, <a href="http://www.usatoday.com/story/news/politics/2015/02/09/internet-of-things-house-caucus-senate-hearing/22927075/" target="_blank"><em>USA Today</em></a> explained how two tech-savvy members of Congress (Reps. Darrell Issa and Suzan DelBene) formed a new Congressional Caucus on IoT to educate their colleagues while a bipartisan group of four senators had the Senate’s first-ever hearing on the topic.</p>
<p>The Federal Trade Commission has calculated that the number of Internet-connected devices currently exceeds 25 billion worldwide. This number is expected to double in the next five years. <a href="http://mashable.com/2015/01/05/samsung-internet-of-things/" target="_blank">Samsung CEO BK Yoon</a> shared in January how his company will contribute to this number. At the 2015 International Consumer Electronics Show, he promised that all Samsung TVs and products will be web-connected in five years.</p>
<p>While IoT benefits businesses and consumers in terms of convenience and efficiency, it also presents risks to security and threats to privacy. According to a 2014 HP report, <a href="http://h20195.www2.hp.com/V2/GetDocument.aspx?docname=4AA5-4759ENW&amp;cc=us&amp;lc=en" target="_blank"><em>Internet of Things Research Study</em></a>, 70 percent of devices have vulnerabilities that would allow a cyber attacker to access valid user accounts. Furthermore, <a href="http://www.cio.com/article/2895398/internet/3-reasons-to-be-wary-of-the-internet-of-things.html" target="_blank"><em>CIO</em> magazine</a> identified what it believes to be the three biggest IoT privacy/security challenges:</p>
<p><strong>1) Unlawful surveillance/invasion of privacy</strong></p>
<ul>
<li>Internet-connected modules installed on various devices (e.g., toys, cars, and home appliances) can be used for unlawful surveillance according to the <a href="http://www.infosecinstitute.com/" target="_blank">InfoSec Institute</a>.</li>
</ul>
<p><strong>2) Threats to enterprise data and network security</strong></p>
<ul>
<li>Any device with built-in network connectivity creates a backdoor connection risk that could be exploited for the unauthorized transfer of sensitive information by a cyber attacker according to <a href="http://www.lumeta.com/" target="_blank">Lumeta</a>.</li>
</ul>
<p><strong>3) Lack of a sound, comprehensive way to manage all IoT devices</strong></p>
<ul>
<li>The current state of IoT lacks a set of standards for application program interfaces (APIs) which are the building blocks of IoT and critical for managing the variety of web-connected devices according to <a href="http://www.brivolabs.com/" target="_blank">Brivo Labs</a>.</li>
</ul>
<p>Given all of this information, IoT should be on your radar and garner more of your attention over time. This includes your attention as a business person and a consumer.</p>
<p><em>&#8212;&#8212;&#8212;&#8211;</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: <a href="https://twitter.com/RyanLahti" target="_blank">@ryanlahti</a></em></p>
<p>(Photo: <a href="https://www.flickr.com/photos/keoni101/7069578953/" target="_blank">Wearable Technology</a>, Flickr)</p>The post <a href="https://www.orgleader.com/internet-of-things/">The Internet of Things Deserves Your Attention</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/internet-of-things/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A New Cyber Intelligence Center?</title>
		<link>https://www.orgleader.com/cyber-intelligence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-intelligence</link>
					<comments>https://www.orgleader.com/cyber-intelligence/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 12 Feb 2015 09:00:16 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=1603</guid>

					<description><![CDATA[Does the U.S. really need a cyber intelligence center to be able to more effectively handle cyberthreats and digital breaches to business and industry as well as government agencies? The Obama administration believes that the country does. According to Reuters, Lisa Monaco, White House advisor for homeland security and counterterrorism, explained that “we need to develop [...]]]></description>
										<content:encoded><![CDATA[<p><img class="alignnone wp-image-1605" src="/wp-content/uploads/2015/02/Cyber-Attacks-in-Real-Time-Flickr.jpg" alt="Cyber Intelligence" width="100%" srcset="https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr-200x149.jpg 200w, https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr-300x224.jpg 300w, https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr-400x299.jpg 400w, https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr-500x373.jpg 500w, https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr-600x448.jpg 600w, https://www.orgleader.com/wp-content/uploads/Cyber-Attacks-in-Real-Time-Flickr.jpg 640w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>Does the U.S. really need a cyber intelligence center to be able to more effectively handle cyberthreats and digital breaches to business and industry as well as government agencies? The Obama administration believes that the country does. According to <a href="http://www.reuters.com/article/2015/02/10/us-cybersecurity-agency-idUSKBN0LE1EX20150210" target="_blank">Reuters</a>, Lisa Monaco, White House advisor for homeland security and counterterrorism, explained that “we need to develop the same muscle memory in the government response to cyberthreats as we have for terrorist incidents.”</p>
<p>While federal task forces currently investigate hacking networks, no one government entity is accountable for coordinating and sharing cyberthreat data collected by the National Security Agency, the Pentagon, the FBI, Homeland Security and other federal agencies. Under the domain of the Director of National Intelligence, the proposed Cyber Threat Intelligence Integration Center would fill this void. It will be modeled on the National Counterterrorism Center launched after the 9/11 attacks in response to criticism of U.S. intelligence and law enforcement agencies who failed to share information that could have helped to prevent them.</p>
<p>In recent years, a number of cyber attacks have impacted the government and U.S. companies. This includes Home Depot Inc., Target Corp., Anthem Inc., JPMorgan Chase, Bank of America and the White House’s computer network. The attack that Monaco called a “game changer” was the attack on Sony Pictures that the FBI publicly accused North Korea of launching. This attack was especially troubling, because hackers incapacitated computers, stole crucial data and pressured the studio to stop the release of a film that took a comedic look at North Korean leader, Kim Jong-un. According to the <a href="http://www.latimes.com/business/la-fi-cyber-threats-20150211-story.html" target="_blank"><em>Los Angeles Times</em></a>, recent attacks have also come from servers in Syria, Iran, Russia and China.</p>
<p>Skeptics of the proposed cyber intelligence center such as Melissa Hathaway (president of Hathaway Global Strategies and former White House cybersecurity coordinator) suggest that creating a new agency is not needed when the government already has existing agencies that monitor and analyze cyberthreat information. In a <a href="http://www.washingtonpost.com/world/national-security/white-house-to-create-national-center-to-counter-cyberspace-intrusions/2015/02/09/a312201e-afd0-11e4-827f-93f454140e2b_story.html" target="_blank"><em>Washington Post article</em></a>, Hathaway recommends that existing agencies be held accountable and forced to become more efficient.</p>
<p>Others believe that a greater focus on cyberthreats by the Obama administration is needed. Richard Clarke, a former White House counterterrorism official, believes it’s a good idea that is long overdue. Scott Larson, a former FBI cybercrime investigator who now operates a cybersecurity company in Minnesota, sees the U.S. in an intellectual arms race that requires it to act.</p>
<p>Given the preceding viewpoints as well as the pace of cyber attacks increasing fivefold since 2009 based on <em>Los Angeles Times</em> research, the U.S. does need to be more proactive in its response to cyberthreats. In doing so, the creation of a new agency makes sense as long as it clearly provides needed resources in an efficient, coordinated manner thereby preventing an increase in bureaucracy.</p>
<p><em>&#8212;&#8212;&#8212;&#8211;</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>
<p>(Photo: <a href="https://www.flickr.com/photos/byzantiumbooks/16115764349/in/photolist-qy6vh2-6tCvre-o63LZ1-c2TmHJ-chFyVN-djV2q4-c2TmXd-c2Tmsj-c2TneE-d6uQFd-c2Tm7J-chFzE9-mwRihT-c2TkM5-edCQgs-edCRtd-c2TnAy-c2TnHo-6c23ua-c2Tnty-chFAxA-4kfw4R-afYamw-chFzUo-djV4x5-dk9vBb-dk9vEC-djV3YB-dgmgJD-c2TmPo-chFz85-dgok4m-dgokhd-dgohqK-c2TmzU-c2Tnku-c2TkEo-c2Tn6o-c2TnN7-8xfVch-c2TmkU-d395t7-bW3hZQ-bW3hRd-bWxiHC-bW3jt7-bWxkRN-bWxmGo-bWxmQw-e1HhJ9" target="_blank">Cyber Attacks in Real Time</a>, Flickr)</p>The post <a href="https://www.orgleader.com/cyber-intelligence/">A New Cyber Intelligence Center?</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/cyber-intelligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity in the Boardroom</title>
		<link>https://www.orgleader.com/cybersecurity-boardroom/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-boardroom</link>
					<comments>https://www.orgleader.com/cybersecurity-boardroom/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 10 Jul 2014 21:47:27 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">https://www.orgleader.com/?p=1199</guid>

					<description><![CDATA[With 1,517 publicly-traded U.S. organizations to date submitting securities filings with the terms “data breach,” “hacking,” “cybersecurity” and “hacker” as potential business risks according to a Wall Street Journal analysis, cyber threats are getting more attention. If you compare this to 2012, you will find a 42% increase in the number of organizations listing these [...]]]></description>
										<content:encoded><![CDATA[<p>With 1,517 publicly-traded U.S. organizations to date submitting securities filings with the terms “data breach,” “hacking,” “cybersecurity” and “hacker” as potential business risks according to a <a href="http://online.wsj.com/articles/boards-race-to-bolster-cybersecurity-1404086146" target="_blank"><em>Wall Street Journal</em> analysis</a>, cyber threats are getting more attention. If you compare this to 2012, you will find a 42% increase in the number of organizations listing these terms as business risks. Combine this increase with media coverage of familiar companies like Target, eBay and Michael’s who have fallen victim to cybersecurity breaches, it is not surprising that corporate boards are focusing on cyber threats and asking the C-suite what steps are being taken to prevent potential breaches.</p>
<p>Regardless of size and industry, companies with an IT infrastructure connected to the Internet possess this vulnerability. The boards that have recognized the impact of this vulnerability have been more involved in laying the foundation to address it. At Kellogg’s, the board regularly discusses cybersecurity at its meetings to deal with concerns that hackers might find a way to steal intellectual property for Kellogg’s cereals and snack foods. In anticipation of this issue, Kellogg’s board set up a security group and hired its first chief information security officer back in 2012.</p>
<p>In addition to Kellogg’s, other notable companies are taking action to shore up cyber defenses. According to the <em>Wall Street Journal</em>, Exxon Mobile regularly tests employees to determine if they respond to phishing emails. Delta Air Lines even added a board member who possesses expertise in IT security. These actions align with the research of <a href="http://www.esg-global.com/blogs/board-of-directors-will-have-a-profound-impact-on-cybersecurity/" target="_blank">Enterprise Strategy Group</a> that found 69% of security professionals report boards and executive management are more engaged in cybersecurity awareness and strategy than they were two years ago. Although this finding is encouraging, it is not sufficient to completely allay concerns. Given the potential consequences of cybersecurity breaches, this increase in engagement needs to continue to be a regular part of boardroom and executive team agendas. For more information, see the <a href="http://fortune.com/2014/04/25/its-time-for-corporate-boards-to-tackle-cybersecurity-heres-why/" target="_blank"><em>Fortune </em>magazine interview with Cisco’s chief security officer</a>.</p>
<p><em>———–</em></p>
<p><a href="https://www.orgleader.com/about/" target="_blank"><em>Ryan Lahti</em></a><em> is the founder and managing principal of OrgLeader, LLC. Stay up to date on Ryan’s STEM-based organization tweets here: </em><a href="https://twitter.com/RyanLahti" target="_blank"><em>@ryanlahti</em></a></p>The post <a href="https://www.orgleader.com/cybersecurity-boardroom/">Cybersecurity in the Boardroom</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/cybersecurity-boardroom/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Most Effective Defense Against Cyber Threats</title>
		<link>https://www.orgleader.com/defense-against-cyber-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defense-against-cyber-threats</link>
					<comments>https://www.orgleader.com/defense-against-cyber-threats/#respond</comments>
		
		<dc:creator><![CDATA[orgadmin]]></dc:creator>
		<pubDate>Thu, 13 Feb 2014 09:00:57 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">/?p=810</guid>

					<description><![CDATA[According to the 2014 Cyberthreat Defense Report by CyberEdge Group, network access control (NAC) was the highest rated of all security technologies to defend against current cyber threats. Seventy-seven percent of IT practitioners are using or plan to use NAC for securing mobile technology. CyberEdge Group’s report is based on a survey of 750 security [...]]]></description>
										<content:encoded><![CDATA[<p>According to the <em>2014 Cyberthreat Defense Report</em> by CyberEdge Group, network access control (NAC) was the highest rated of all security technologies to defend against current cyber threats. Seventy-seven percent of IT practitioners are using or plan to use NAC for securing mobile technology. CyberEdge Group’s report is based on a survey of 750 security decision makers and professionals in North American and European companies with 500 or more employees.</p>
<p>The report highlights that information security is more difficult because of three changes taking place in organizations:</p>
<ul>
<li>Increased complexity of IT infrastructure due to greater network connections and use of cloud, mobile and virtualization technology</li>
<li>Problems effectively reducing exposure as cyber attacks increase</li>
<li>Decreased capacity to manage endpoints resulting from an increase in network-enabled device usage at work</li>
</ul>
<p>These three changes help explain why more than 60% of the respondents in the study indicated that they had been breached last year. One finding that was even more concerning is 20% of the organizations admitted to doing nothing to evaluate the security of their mobile devices in between quarterly or annual network vulnerability scans. Based on these findings, clearly NAC is needed sooner rather than later.</p>
<p>If you would like to read the full report, click on this link: <a href="http://cyber-edge.com/wp-content/uploads/2014/01/CyberEdge-2014-CDR.pdf" target="_blank">2014 Cyberthreat Defense Report </a></p>The post <a href="https://www.orgleader.com/defense-against-cyber-threats/">The Most Effective Defense Against Cyber Threats</a> first appeared on <a href="https://www.orgleader.com">OrgLeader, LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orgleader.com/defense-against-cyber-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
