The Brandeis GPS blog

Insights on online learning, tips for finding balance, and news and updates from Brandeis GPS

Tag: info sec

Are you protected?

by: Scarlett Huck

Have more questions? Want to learn more? Don’t miss our #AskTheExpert event with Cyber Security Strategist and Evangelist at Intel Corporation, Matthew Rosenquist! You can RSVP here.

2015 has certainly not been deprived of threats and successful hackings into cyberspace. With big business companies such as Home Depot, Target, Staples,  and Sony under fire, it is hard to believe that anyone is safe.

Why does this continue to be a growing concern? Who are behind these attacks? Survey says that more than half of reported incidents were staff-related. These breaches included, but were not limited to: “unauthorized access to data, breach of data protection regulations, and misuse or loss of confidential information”. When dealing with staff-related issues, there are certain precautions that can be taken. The first is to make sure employers are informed of the risks and of the data protection laws and the consequences of breaking them. It is also important to make sure employers are not tricked into divulging secure information via over-the-phone scams.

Attacks
But what about the other half of attacks that are not employee based? These are the attacks that tend to be more deliberate and malicious. For example, take the Impact Team. This is a group of hackers who are hacking for what they believe to be ‘good’. In a quote directly from the group they stated they plan to hack “[a]ny companies that make 100s of millions profiting off pain of others, secrets, and lies. Maybe corrupt politicians. If we do, it will be a long time, but it will be total.” The team is currently best known for their hack of the adultery-encouraging website Ashley Madison. The hackers demanded the site be taken down immediately or the personal information of Ashley Madison’s clients would be released in 30 days. When these terms were not met, a list of names and email addresses of the site’s users was released in order to expose them for their infidelity. Situations like this are becoming known as “hacktivism,” or the act of hacking for a politically or socially motivated purpose.

AttackDist
With attacks occurring every day, it is important to remember to protect yourself. The Department of Homeland Security offers many tips including using proper passwords and privacy settings, thinking before you post on social media and being cautious of what you download. It is also important to be cautious if you run a small business, which are commonly hacked due to lack of security. As far as big business is concerned, larger strides must be taken. Business Insider recommends the steps that must be taken to prevent future attacks, President Obama is currently requesting $14 billion in the 2016 budget proposal in order to tighten government cybersecurity and laws regarding cybersecurity and data protection are becoming stricter. Within the near future, there is hope for the decrease in cyber attacks.

Have more questions? Want to learn more? Don’t miss our #AskTheExpert event with Cyber Security Strategist and Evangelist at Intel Corporation, Matthew Rosenquist! You can RSVP here.

 

Not subscribed to our blog?

Click here to subscribe!

 

Footerindesign

“Ask the Expert” Special Event Webinar

InfoBubblez22

“Ask the Expert: Cyber Security” 

Led by Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corporation

Wednesday, October 21st at 7pm via Adobe Connect

Matt’s areas of expertise include :
  • Security industry advocacy
  • Security strategy and planning
  • Security operations management
  • Platform security product/service development and sustaining operations
  • Emergency/Crisis response command, control, and communications
  • Security policy development, training, and compliance oversight
  • M&A information security strategy and management
  • Security product strategic planning
  • Technical and behavioral risk assessment and threat analysis
  • Determination of security business value and ROI
  • Threat Agent Risk Assessment (TARA) methodology
  • Internal and external investigations
  • Corporate consulting for risk management and strategic alignment
  • Security industry outreach, evangelism, speaker, and champion

 

RSVP here

 

MatthewRosenquist-Oct.21Webinar

Matthew Rosenquist joined Intel Corp in 1996 and benefits from over 20 years in the field of security. Mr. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities and organizations which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this industry leading organization which brings together security across hardware, firmware, software and services.

The community can connect with Matthew via Twitter @Matt_Rosenquist, Intel Blog and LinkedIn.

 

Protected by Akismet
Blog with WordPress

Welcome Guest | Login (Brandeis Members Only)