SEC warns of cybersecurity threat to global economy | COO: Rising security threats should prompt creation of business continuity plans | End-to-end encryption an option for Google's new messaging app
Created for {EMAIL} | [Web Version]
May 19, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[SEC warns of cybersecurity threat to global economy]
[Senate Banking Committee Holds Hearing On Wall Street Reform]
White (Alex Wong/Getty Images)
Financial exchanges are aware of the threat to their networks from rogue actors, but they still lag behind some other sectors in preparing themselves against cyberattacks, the Securities and Exchange Commission said Tuesday. In what many called the strongest condemnation to date against financial-system vulnerabilities, SEC Chair Mary Jo White said the agency's examiners are policing broker-dealers in light of increasing threats, such as the recent Society for Worldwide Interbank Financial Telecommunication cyberheist.
[Reuters] (5/18)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[COO: Rising security threats should prompt creation of business continuity plans]
Health care IT executives should create and manage three integrated business continuity phases, which include disaster recovery planning, business continuity planning and emergency operations planning, amid increasing cybersecurity threats, writes Frank Picarello, chief operating officer of TeamLogic IT. Having a solid business continuity plan allows health organizations to quickly resume normal operations and experience minimal impact in cost and quality of care in the event of data theft, Picarello writes.
[Health Data Management] (5/18)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[End-to-end encryption an option for Google's new messaging app]
Google says its new messaging app, Allo, allows users to switch on end-to-end encryption. Some privacy advocates criticized the company for not making the messaging encrypted by default.
[The Hill] (5/18)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Cyber Risk
[Survey: Firms see cyberattacks as norm but don't build adequate defenses]
Almost 25% of respondents in a VMware survey think their company will be a victim of a cyberattack within three months, while 39% say their firm does not build defenses fast enough. Over 50% of respondents say employees are the biggest threat to security. "Security is not just about technology," VMware's Joe Baguley said. "As the research shows, the decisions and behaviors of people will impact the integrity of a business."
[Business Cloud News (U.K.)] (5/12)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Cybercriminal trying to sell login data stolen from LinkedIn] The Hill (5/18)
By the Numbers
[Survey: Most risk managers say hackers are targeting their firms]
Nine in 10 risk managers polled at last month's Risk and Insurance Management Society conference said their companies were breached by hackers at least once in the past year, per Hartford Steam Boiler Inspection and Insurance. Also, nearly two-thirds of respondents said their companies had faced more than six breaches. Nearly one-third said the same in 2015.
[PropertyCasualty360] (5/18)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Practice & Policy
[Gartner: Channel partners positioned to defend against cyberattacks]
Channel partners are positioned to help enterprise customers defend against cyberattacks in two phases: prevention, as well as response and recovery, Gartner's Roberta Witty says. Partners and businesses must view attacks as crises to successfully defend against cybercriminals, Gartner Research Director Rob McMillan says.
[ARN (Australia)] (5/18)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Adoption of technology can revolutionize industry] CIO.com (5/17)
AllClear ID News
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
Diligence is the mother of good fortune.
Miguel de Cervantes,
writer
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â