As the financial services industry moves toward an ever-greater dependence on technology, we must always keep an eye on the future to ensure that any new technological advancement or implementation delivers the same, if not better, benefits and risk management capabilities. One emerging area that has garnered a lot of attention in recent years is Distributed Ledger Technology (DLT). While DLT holds great promise, there is currently no clear path around how to implement the technology in a way that addresses documented and evolving security risks.
Counterfeiters do not take time off. At its core, counterfeiting preys upon our vulnerabilities and takes advantage of the average customer at any cost. This is particularly true right now during the coronavirus pandemic, the most inconvenient and vulnerable moment in generations. In the midst of mass shortages and colossal demands for certain products, especially in the health field, the counterfeit community has seen a golden opportunity. Over the past few months, tens of millions of new counterfeit products have been seized or identified on the web. These include fraudulent face masks, ventilators, disinfectants and testing kits.
Evacuations and lockdowns are two events no organization wants to face, but every organization should be prepared for. They often happen in response to particularly dangerous situations that pose an immediate threat to people and property. It can be difficult to know how and when to make the decision to lockdown or evacuate, and it can be even more difficult to manage once the decision has been made. In either case, it requires organizations plan, test and have the right tools in place to reach all of their people quickly with information on what actions they should take to stay safe.
Unfortunately, the pandemic has forced many people and businesses to reconsider biometric technology. With the COVID-19 virus spreading easily through touchpoints, fingerprint scanners can quickly become a source for infections, especially in public spaces. Offices and ATMs contain many points of contact, and maintaining cleanliness on surfaces is nearly impossible. Unfortunately, these high traffic areas are also frequently the ones that would benefit the most from increased security.
It’s easy to see why the Open Supervised Device Protocol (OSDP), has become the security industry’s gold standard for access control installations. It enhances security, adds flexibility and makes systems easy to update and integrate with other devices. The Security Industry Association (SIA), with significant input from manufacturers and integrators, introduced OSDP in 2011 and it is now recommended for any public or private enterprise installation requiring a high level of security. Earlier this year, the International Electrotechnical Commission approved OSDP as an international standard.
The Black Lives Matter movement is spurring record-breaking fundraising online. In fact, the Minnesota Freedom Fund pulled in more than $30 million in donations alone following the death of George Floyd. The outpouring of financial support is great for these grassroots movements; however, large numbers like these often catch the eye of opportunistic scammers, unfortunately. While Black Lives Matter supporters are advocating on the street for a cause, scammers are capitalizing on their movement for their own gain.
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
My favorite definition of the (public) cloud is “It’s someone else’s computer.” That is really what any external cloud service is. And if your services, data and other assets are located on someone else’s equipment, you are at their mercy on whether you can access those assets and data at any time. It isn’t up to you. It’s solely determined by them, and any service level agreement you agreed to. And you can lose everything stored there permanently. You should have multiple backups of your data no matter where it is stored, especially including if it is stored using a cloud service.
Obstacles including budget concerns, time constraints, stubborn company culture, or a lack of cybersecurity best practices can seem overwhelming, especially to a smaller organization with limited resources. Fortunately, there are reasonable solutions to each of these roadblocks that can help all organizations be more secure.