New National Cybersecurity Strategy [Subscription Center]( | [Unsubscribe]( [TechRepublic] Wednesday, March 08, 2023 TODAY'S TOP STORY [CrowdStrike: Attackers focusing on cloud exploits, data theft]( Cloud-focused threat actors and data exfiltration rise, while time to extract data drops, and that equals a sea change in cyberthreats. [Read More]( Resource of the day [Elevate AI the leading speech-to-text API]( AI models trained on the largest CX datasets in the world built using the latest AI, machine learning, deep learning, and NLU/NLP research high-dimensional semantic space modelling with context awareness transformer-based platform. [Transmission of sensitive data policy]( Data in transit means data is at risk if the proper precautions arenât followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this in mind, it is essential for company personnel to adhere to firm and clear guidelines for sharing sensitive data with others. These guidelines protect the business, its reputation and its customers by ensuring that only necessary personnel are able to receive and view material of a confidential nature. From the policy: Sensitive information in electronic form must be encrypted before being sent and/or transferred via encrypted methods. Encrypted storage methods can involve secure USB drives, whole disk encryption and file/folder encryption software. Encrypted transmission methods can involve secure file transfer protocol, VPN connectivity or encrypted email services. These concepts are discussed further in the âSpecific transmission guidelines based on content typeâ section and the associated âSuggested encryption productsâ document, which contains 20 examples. Employees should not use public email/document services such as Gmail or Dropbox to send or receive sensitive information. Exceptions can be permitted based on the discretion of the IT director. TRENDING NOW [This 18-course ethical hacking bundle is under $50]( Ethical hacking is a great skill to learn with new cyber threats on the rise. Learn how to fight back with this ethical hacking course bundle. [Read More]( [New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)]( The Biden administrationâs National Cybersecurity Strategy will go after attackers, make a resilience-first defense and build collaboration. [Read More]( [Google Workspace admins can now use client-side encryption on Gmail and Calendar]( Organizations subject to government regulations can gain more control over their own security within Gmail and Google Calendar. [Read More]( ADDITIONAL TECHREPUBLIC RESOURCES [Top 10 open-source security and operational risks of 2023]( New report reveals that many software companies rely on open-source code but lack consistency in how they manage risks and vulnerabilities. [Keep Reading]( [Pen testing report: IT budgets should focus on entire security stack]( With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus. [Keep Reading]( [Digital forensics and incident response: The most common DFIR incidents]( A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. [Keep Reading]( [Report: Stress will drive a quarter of cyber defenders out the door]( A new study sees the cybersecurity crunch increasing through 2025 as experts head for the hills among an ever-increasing job market gap. [Keep Reading]( Today's recommended downloads [Elevate AI the leading speech-to-text API](
(NICE)
[Pandemic response policy](
(TechRepublic Premium)
[LIFETIME LICENSE: Microsoft Office Pro for Windows](
(TechRepublic Academy)
[WordPress security checklist](
(TechRepublic Premium)
[The All-In-One 2022 Super-Sized Ethical Hacking Bundle](
(TechRepublic Academy) â CONNECT WITH TECHREPUBLIC We're now on TikTok and Instagram! â [Facebook]( [Twitter]( [LinkedIn]( [TikTok]( [Instagram]( [YouTube]( Visit the [Subscription Center]( to get other free newsletters, manage your account settings or to be removed from TechRepublic communications. [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2022 TechnologyAdvice, LLC. All rights reserved. All rights reserved. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here](.