Menu
Cimetrics
0
  • Home
  • Products
    • BACstac BACnet Stacks
    • BACnet MS/TP, B/IP & B/SC Routers
    • High-Density B/SC Diagnostic Hubs & Site CA
    • BBMD in a Box
    • Secured by Cimetrics™
    • BACnet Modules
    • BACnet Metering Gateways
    • BACnet Web Services
    • BACnet Explorer
    • Request Product Information
  • Services
    • For Building Owners
    • For Product Developers
    • For Facility Managers
    • Request Technical Support
  • About
    • About Cimetrics Video
    • Management
    • Vision
    • History
    • Our Technology
    • Our Customers
    • Case Studies
    • Career Opportunities
    • Terms & Conditions
    • Privacy Policy
  • Contact Us
    • Contact Us
    • Request Product Information
    • Request Technical Support
    • Security Center
    • Do not sell my personal information
    • Product Return Policy
    • Limited Hardware Warranty
  • Blog
  • Sign in
  • United States (USD $)
  • Your Cart is Empty
Cimetrics
  • Home
  • Products
    • BACstac BACnet Stacks
    • BACnet MS/TP, B/IP & B/SC Routers
    • High-Density B/SC Diagnostic Hubs & Site CA
    • BBMD in a Box
    • Secured by Cimetrics™
    • BACnet Modules
    • BACnet Metering Gateways
    • BACnet Web Services
    • BACnet Explorer
    • Request Product Information
  • Services
    • For Building Owners
    • For Product Developers
    • For Facility Managers
    • Request Technical Support
  • About
    • About Cimetrics Video
    • Management
    • Vision
    • History
    • Our Technology
    • Our Customers
    • Case Studies
    • Career Opportunities
    • Terms & Conditions
    • Privacy Policy
  • Contact Us
    • Contact Us
    • Request Product Information
    • Request Technical Support
    • Security Center
    • Do not sell my personal information
    • Product Return Policy
    • Limited Hardware Warranty
  • Blog
  • Translation missing: en.general.country.dropdown_label

  • 0 0

Bi-Weekly CyberSecurity Recap end of June 2019

June 21, 2019

Curated cybersecurity news

summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.

 

Cybersecurity Trends in The Healthcare Industry

The healthcare Industry contains private and sensitive information about millions of patients in every country. Therefore, it’s no wonder that in 2017, it was the target of over 50 percent of cyber-attacks. Loaded with identity-revealing information like social security numbers, dates of birth, billing information and, of course, health insurance information, these details can be used for any number of fraudulent actions.

High-risk behaviors expose most travelers to cyber risks

The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research.

Is Cybersecurity the Weakest Link in Your Supply Chain?

Manufacturers will not be able to fully realize the benefits of digital transformation without first addressing cybersecurity. The Industrial Internet of Things (IIoT) is redefining industrial manufacturing, enabling Industry 4.0 (I4R). Emerging technologies such as the IIoT, artificial intelligence (AI), machine learning (ML), and blockchain (all in the cloud) are redefining industrial supply chain management (SCM). However, with an increasing focus on IIoT-enabled supply chains, and the large repositories of sensitive data they provide, manufacturing assets and supply chains have now become a lucrative target for cyber attacks. While manufacturers can reap the many benefits of digital supply chains, it is imperative now more than ever that they pay attention to the growing concerns of cybersecurity.

However, according to Gartner, industrial managers are not paying enough attention to IIoT security, as they are not prioritizing these initiatives (Figure 1). This article will dive into the cybersecurity challenges and vulnerabilities in digital supply chains, review cybersecurity frameworks, and recommend holistic approaches to mitigate those risks.

Security for All Sizes: When Vendors Fall Out

When a security pro gets different vendor solutions to work with each other, it's a cause for celebration. Unfortunately, most security stories seem like they're written by George R.R. Martin and they don't resolve to "happily ever after" conditions. Yes, things can run well for a while, even a good long while, but there comes a day for many a partnership where the parties involved part ways and their products no longer play well with each other.

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

MIAMI — The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s computer systems.

Riviera Beach, a small city of about 35,000 people just north of West Palm Beach, became the latest government to be crippled by ransomware attacks that have successfully extorted municipalities and forced them to dig into public coffers to restore their networks. A similar breach recently cost Baltimore $18 million to repair damages.

Cybersecurity Accountability Spread Thin in the C-Suite

While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go.
A spate of recent surveys offer indications that the philosophy that "cybersecurity is everyone's responsibility" is gaining steam in the C-suite at most large organizations. But digging into the numbers — and keeping in mind perennially abysmal breach statistics — it's clear that while awareness has broadened across the board room, accountability and action are still spread pretty thin.

Missing the Forest for the Trees: Top 5 CISO Pitfalls in Cybersecurity

There is a lack of focus in cyber security.  This rarely stems from lack of hard work, desire, technical ability or aspiration.  Many cybersecurity leaders and teams voice concern around lack of funding, minimal executive support and share all too common stories of burnout at all levels of the organization (including the CISO).  However, these are often symptoms rather than root causes.  Without understanding the root causes, cyber security leaders can miss the forest for the trees — with the company’s true security risk reduction suffering for it.

  • Share:

Leave a comment

Comments will be approved before showing up.


Also in Cimetrics News

April 2025 company news
April 2025 company news

May 01, 2025

BACnet User Group June 12, Energy Optimisation with Analytika, April Cybersecurity news, Cybersecurity course from BACnet international and more...

Read More

Cybersecurity news April 2025
Cybersecurity news April 2025

April 29, 2025

CISOs band together to urge world governments to harmonize cyber rules, What To Know About AI, Cybersecurity And Compliance Framework, New Bill Mandates Cybersecurity Overhaul for Federal Contractors and more...

Read More

March 2025 company news
March 2025 company news

April 01, 2025

Why BACstac/DN is the Best Choice for BACnet Development, AI-Ready Buildings, Analytika became a Qualified Service Provider for the New York area and more...

Read More

Follow

Sign up to get the latest on sales, new releases and more…

© 2025 Cimetrics.
Powered by Shopify

American Express Diners Club Discover Mastercard Shop Pay Visa