Singapore is reportedly developing a wearable device that may be issued to every resident as a way to facilitate contact tracing during the COVID-19 pandemic. The move, however, has elicited concerns from the public about the lack of privacy associated with contact tracing devices.
Fifty-six (56) percent of employees are using their personal computers as their company’s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec.
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.
A new Kansas emergency bill passed earlier this week includes the COVID-19 Contact Tracing Privacy Act, which aims to protect the privacy of persons whose information is collected through contact tracing and the confidentiality of contact data.
In a Federal Information Security Modernization Act of 2014 report filed with Congress last week, the White House says the number of cybersecurity incidents recorded at US federal agencies in 2019 went down by 8 percent.
There has been a 400 percent increase in attempted hacks since February 2020 coinciding with a period when the maritime industry turned to greater use of technology and working from home due to the Coronavirus pandemic, according to Israeli cybersecurity specialist Naval Dome.