Toggle light / dark theme

80 million cyber attacks per year — 400 every minute — but as many as 70 percent of them go undetected. And, these numbers are anticipated to go drastically higher now “Ransomware” is paying off for hackers.


Using the internet is a risk most businesses and individuals take for granted. But as more data is stored online, the world is becoming ever more vulnerable, the head of global internet security firm Symantec, Michael Brown, says.

Read more

I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.


By Jayadev Parida

Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.

Cheer up, the worst is yet to come! One of those famous words penned by noted American author and novelist Mark Twain a long ago. This sentence is a stark reminder of India’s dawdling approach to new threats. India’s cyber sleuth may be holding their nerves for the worst to frame a robust apparatus to secure cyber ecosystem. The Google Trends of 2015 demonstrated that Islamic State (IS) was a buzz word in India while terrorism continued to exist as the area of concern. Nonetheless, interest over the time for IS’ in Indian Cities is increasing significantly.

Read more

What happens when a patient is in X-Ray and the X-Ray machine blows up like a bomb killing the patient and staff in the room? Well, a new report shows that it can happen where machines are connected to any network (including the net) because a team of hackers showed in their report how they were they hacked several D.C. and Maryland Hospitals medical devices and numerous machines including life support, X-Rays, etc.


Area hospitals are riddled with cybersecurity flaws that could allow attackers to hack into medical devices and kill patients, a team of Baltimore-based researchers has concluded after a two-year investigation.

Hackers at Independent Security Evaluators say they broke into one hospital’s systems remotely to take control of several patient monitors, which would let an attacker disable alarms or display false information.

The team says it strolled into one hospital’s lobby and used an easily accessible kiosk to commandeer computer systems that track medicine delivery and bloodwork requests — more opportunities for malicious hackers to create mayhem.

Ireland has real opportunity to benefit from increased global investment and establish itself as a world-class hub for cyber security practices, solutions and investment, according to a new report from Deloitte. Conducted in association with the International Sustainability and Investment Centre, the report found that Ireland has proven itself to be an innovative centre for technology and has the potential to become a world leader in cyber security.

Respondents to a survey for this report identified increased regulation on data privacy (73%), more sophisticated scamming and phishing (59%), and growth in identity theft (53%) as the major trends in the cyber area over the next five years. This will force businesses to change how they organise and manage their data security.

More than one third (36%) of respondents believe there will a trend towards outsourcing cyber management to third party organisations, and 27 percent think that businesses will establish global/regional centres of excellence for managing this function. The implication of this will be that a small number of locations will be preferred for basing these centres of excellence.

Read more

Law Firms are prime targets for hackers.


Law firms are considered by many hackers to be soft targets with a wealth of valuable information. Data from social security numbers, credit cards, and client confidences is enough to make the criminal mind salivate with malicious intent. Between 31–45% and 10–20% of firms have been infected by spyware or experienced security breaches respectively. But what can a private practitioner or law firm do to prevent these trespasses on their networks?

In this episode of The Florida Bar Podcast, host Adriana Linares welcomes cyber security expert Sherri Davidoff to discuss the dangers to data that exist for law firms today. To begin their dialog, they define what ransomware is and tell us why so many firms give in to its extortion.

I wish the CA AG a lot of luck; however, her approach is very questionable when you think about downstream access and feed type scenarios. Example, Business in Boston MA has an agreement with a cloud host company in CA, and Boston also has data that it pulls in from Italy, DE, etc. plus has a service that it offers to all of users and partners in the US and Europe that is hosted in CA.

How is the CA AG going to impose a policy on Boston? It can’t; in fact the business in Boston will change providers and choose to use someone in another state that will not impact their costs and business.

BTW — I didn’t even mention the whole recent announcement from China on deploying out a fully Quantum “secured” infrastructure. If this is true; everyone is exposed and this means there is no way companies can be held accountable because US didn’t have access to the more advance Quantum infrastructure technology.

https://lnkd.in/b9xXVAN


Feb. 17 — California Attorney General Kamala Harris (D) has released the state’s data breach report, laying out the legal and ethical responsibilities of businesses to keep information safe and perhaps most importantly outlining what the state believes is “reasonable security” that companies must employ to avoid possible enforcement actions.

Under the state’s information security statute, businesses must use “reasonable security procedures and practices” that “protect personal information from unauthorized access, destruction, use, modification, or disclosure,” the report said.

Under the guidelines in the report released Feb. 16, failing to implement all 20 of the Center for Internet Security’s Critical Security Controls that apply to an organization’s environment constitutes a lack of reasonable security. The controls define a minimum level of information security all organizations that collect or maintain personal information should meet.

Read more