Cybersecurity measures have tech and cultural components | Two-factor authentication key to securing the Internet of Things | How automation can help organizations fight cyberattacks
Created for {EMAIL} | [Web Version]
May 5, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[Cybersecurity measures have tech and cultural components]
Cybersecurity risk mitigation is partly about technology and thus an IT matter, but HR also has a role to play. "People often mistake security risk in a company as being primarily a technology risk -- making sure you have the right systems in place, etc.," said David Meyer, vice president of product at OneLogin. "But itâs just much, if not more, a cultural risk." HR can help prevent innocent mistakes as well as sabotage from disaffected employees.
[Workforce online] (5/4)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[Two-factor authentication key to securing the Internet of Things]
To improve security for the Internet of Things, whether it's a personal garage door or a smart city system, two-factor authentication is key, writes Adam Fridman. He suggests inspecting personal accounts occasionally to ensure that all information is frequently updated.
[Inc. online (free registration)] (5/3)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [How automation can help organizations fight cyberattacks] Network World (5/3)
Cyber Risk
[Opinion: Cyberinsurance needs to mature to match threats]
Cybercrime continues to increase as hackers develop tools and techniques and people use more and more connected devices, writes Tony Boobier of IBM. Cyberinsurance therefore must mature to provide adequate coverage against the growing threats, he writes.
[RiskAndInsurance.com] (4/28)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
By the Numbers
[Experts discuss possible cybersecurity scenarios for near future]
[Hackathon Held In Miami With Goal Of Improving Communications And Information Access In Cuba]
(Joe Raedle/Getty Images)
Cybersecurity experts say that by 2020, biological and emotional data gathered from wearables could be manipulated and exploited by hackers. Leaders at the Center for Long-Term Cybersecurity developed five likely possibilities for future data use in such areas as marketing, politics and the workplace.
[The Conversation (U.S.)] (4/28)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Studies: IT leaders cite lack of communication, efficiency as deterrents to security] CIO.com (5/2)
Practice & Policy
[Reports outline strategies for securing the Internet of Things]
Security remains a top priority as the Internet of Things begins to take hold in the consumer and business markets, experts say. This article discusses five reports from major players such as AT&T, Symantec and Telefonica highlighting steps IT professionals should take for IoT security.
[Computer Business Review online (U.K.)] (5/3)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
AllClear ID News
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
Achieving success is a challenge, but so is struggling, so you may as well choose success.
Rob Liano,
writer and consultant
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â