Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Google Alerts catches fake data breach notes pushing malware

    • Fraudsters recently have started to push fake data breach notifications for big company names to distribute malware and scams.
    • They’re mixing black SEO, Google Sites, and spam pages to direct users to dangerous locations.
    • As for the topics, they are of the most diverse kind. From various software products (note-taking, SDKs, street lighting design, firmware, libraries) and DIY construction projects to oil vapes, canine breeding, hardware issues, and teeth aligners.
    • Whenever someone searches for a certain topic, the scammer’s results would rank higher in the results and have a better chance of being accessed to start the redirect chain to nasty offers and content.
    Bleeping Computer - Ionut Ilascu | June 16, 2020
    hak-iq.us20.list-manage.comJune 16, 2020
  • COVID-19 Privacy Implications: Workplace Temperature Screening

    • While preparing to reopen offices, companies are assessing various screening programs to mitigate the risk of spreading COVID-19.
    • If your company is using the services of a third party to screen employees (i.e., for elevated temperatures), including mobile applications developed by third parties, it is important to review these agreements and make sure that they include sufficient privacy and security provisions that address their obligations and limited use rights as it relates to the personal information being collected through the screening.
    The National Law Review - Susan E. Benington, Charumati Ganesh, Jeffrey M. Stefan II | June 15, 2020
    hak-iq.us20.list-manage.comJune 15, 2020
  • Our New Normal Of Remote Work Makes Data Loss Prevention Crucial For GDPR Compliance

    • Cybersecurity has become a priority as GDPR holds companies accountable for keeping consumers' personal information safe.
    • Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR and other regulations.
    • The "new normal" of remote work isn't going away any time soon.
    • Businesses must maintain high standards and prioritize data protection practices as employees work from home for the foreseeable future.
    - Edward Bishop | June 15, 2020
    hak-iq.us20.list-manage.comJune 15, 2020
  • 10 common reasons for HIPAA violations

    • In the past 12 months, there were 393 protected health information breach incidents reported to HHS.
    • The incidences included malicious email hacking, unauthorized access to EHRs and medical records as well as inadequate third-party business agreements.
    - Laura Dyrda | June 15, 2020
    hak-iq.us20.list-manage.comJune 15, 2020
  • Why Securing Endpoints Is The Future Of Cybersecurity

    • 86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.
    • Verizon’s DBIR reflects the stark reality that organized crime-funded cybercriminals are relentless in searching out unprotected endpoints and exploiting them for financial gain, which is why autonomous endpoints are a must-have today.
    - Louis Columbus | June 14, 2020
    hak-iq.us20.list-manage.comJune 14, 2020
  • New cyber threat takes top spot as number one cause of loss

    • The key selling point for cyber insurance has evolved over recent years as cyberattacks have become more prominent.
    • Several years ago, cyber insurance was important because of data breach concerns and protecting organizations’ liability if private data was exposed.
    • For the first time in over five years of tracking, ransomware has landed at the top of the list of loss causes in the non-healthcare segment.
    - Alicja Grzadkowska | June 11, 2020
    hak-iq.us20.list-manage.comJune 11, 2020
  • Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

    • Historically, if security leadership existed, it typically reported into a vice president of infrastructure or similar role and was constricted to operational activity around things like access control.
    • These days CISOs are not only asked to report to boards, but also be on them.
    CSO Online - Jaikumar Vijayan | June 11, 2020
    hak-iq.us20.list-manage.comJune 11, 2020
  • Babylon Health's software error allowed users to see other patients' recorded virtual visits

    • UK-based telehealth giant Babylon Health confirmed that a software error enabled users to view recordings of other patients' video consultations in the UK.
    • We expect hospital systems and the likes of giant telehealth vendors like Teladoc and Amwell to increasingly scale up cybersecurity efforts on their own platforms in order to maintain patient privacy.
    Business Insider - Erum Ahmed | June 11, 2020
    hak-iq.us20.list-manage.comJune 11, 2020
  • Why most organizations are failing at securing third-party remote access

    • It shouldn’t be surprising to you that third-party access is risky.
    • A majority of organizations rate the level of risk from third-party access to privileged systems or data, as either “high” or “extremely high.”
    • Third parties have unique needs, unique risks, and therefore require a unique solution focused on the problem.
    - Rion Walker | June 10, 2020
    hak-iq.us20.list-manage.comJune 10, 2020
  • The Ticking Timebomb: Data Breaches from Hardware End-of-Life

    • An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life.
    • As cloud storage continues to expand at an exponential rate, data centers are popping up all over the globe, and these gargantuan facilities are expected to safeguard the vast amount of data they store.
    - Heidi Parthena White | June 10, 2020
    hak-iq.us20.list-manage.comJune 10, 2020