Two years removed from the announcement of the attack, we can now take a look at the lessons we learned from the OPM data breach.
Your organization has been breached. What do you do now? Philip Lieberman explains in this 4-minute Game Changers Silicon Valley interview.
Here’s the situation. This is a garden variety cyber attack. In fact, many companies are victims of these types of attacks and choose to pay off the attackers.
The problem is not with the employees or IT itself. It’s with the CEO and Board of Directors who are not aware of risks and the solutions that can minimize consequences in the cyber security space.
Ponemon highlights a number of items that are absolutely excellent to focus on as a security program. However, nowhere on their list did they make room for truly preventative measures like securing privileged credentials.
The lesson from the Panama Papers leak is that it is up to the client to inspect the cyber warfare capabilities of their law firm. If there is little to show, then they should consider their confidentiality blown.
We’ll likely never eliminate all security threats, but with a sound, layered cyber security approach we can reduce their impact. And when it comes to mitigating the risks of negligent insiders, organizations need to move beyond basic IT security training and look for ways to limit the damage.
The CEO of Ashley Madison resigned as a result of the very public data breach the company suffered. This CEO follows the same IT security road of shame that the leadership of Target and other corporations have taken.
According to the survey, 87% of IT professionals believe large financial hacks are happening more often than reported – and right under the watchful eyes of security auditors.
If you don’t want your company to be the next data breach headline, start with the assumption that every workstation is compromised, and every device connected to the network is infected and under the control of outsiders.