In March, the European Commission demanded that tech firms remove terrorist posts within one hour of their appearance. Similar calls have come from corporations and commentators, alike. These forms of pressure are important but focused only on the problem of social media serving as a tool for spreading violent ideas and propaganda. Disturbingly, social media use itself may be predisposing individuals to commit terrorism, shootings and other forms of violence by impacting user behavior and well-being.
How do enterprise security professionals ensure that if the worst should happen, they can sustain their operations indefinitely to ensure the safety of those they are called to protect?
Hospitals can be dangerous places. From 2012 to 2014, healthcare institutions reported a 40 percent increase in violent crime, with more than 10,000 incidents mostly directed at employees.
More and more, the news is filled with stories about how personal information is being used to benefit others. From revelations after Mark Zuckerberg’s pseudo mea culpa in front of Congress last month, to stories about fake news, identity theft, and how data mining is being used by political campaigns to understand the demographics and psychographics of potential voters, these Little Brothers are collecting massive amounts of personal data – all with our tacit consent.
According to FBI crime statistics released in September of 2017, crime increased in the U.S. for the second consecutive year – posting a 4.1-percent surge last year compared to previous figures.
Cybersecurity breaches make headline news, seemingly on a daily basis. Private data for millions of consumers is compromised at greater frequency. Organizations scramble to remediate damages and restructure their cyber defense tactics. To address this new normal and further protect personal information from data breaches, the European Union will formally implement the General Data Protection Regulation (GDPR) on May 25, 2018.
Whenever there’s a data breach, it’s easy to get caught up in the root cause analysis – a misconfigured device, an unpatched application, an employee falling for a phishing attack, you name it. But really, the root causes of most breaches are not these moment-in-time errors. Instead, they are almost always shortsighted decisions made well before the breach ever occurs.