Bi-Weekly CyberSecurity Recap end of June 2019

by Svetlana Lyons June 21, 2019

Bi-Weekly CyberSecurity Recap end of June 2019

Curated cybersecurity news

summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.

 

Cybersecurity Trends in The Healthcare Industry

The healthcare Industry contains private and sensitive information about millions of patients in every country. Therefore, it’s no wonder that in 2017, it was the target of over 50 percent of cyber-attacks. Loaded with identity-revealing information like social security numbers, dates of birth, billing information and, of course, health insurance information, these details can be used for any number of fraudulent actions.

High-risk behaviors expose most travelers to cyber risks

The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research.

Is Cybersecurity the Weakest Link in Your Supply Chain?

Manufacturers will not be able to fully realize the benefits of digital transformation without first addressing cybersecurity. The Industrial Internet of Things (IIoT) is redefining industrial manufacturing, enabling Industry 4.0 (I4R). Emerging technologies such as the IIoT, artificial intelligence (AI), machine learning (ML), and blockchain (all in the cloud) are redefining industrial supply chain management (SCM). However, with an increasing focus on IIoT-enabled supply chains, and the large repositories of sensitive data they provide, manufacturing assets and supply chains have now become a lucrative target for cyber attacks. While manufacturers can reap the many benefits of digital supply chains, it is imperative now more than ever that they pay attention to the growing concerns of cybersecurity.

However, according to Gartner, industrial managers are not paying enough attention to IIoT security, as they are not prioritizing these initiatives (Figure 1). This article will dive into the cybersecurity challenges and vulnerabilities in digital supply chains, review cybersecurity frameworks, and recommend holistic approaches to mitigate those risks.

Security for All Sizes: When Vendors Fall Out

When a security pro gets different vendor solutions to work with each other, it's a cause for celebration. Unfortunately, most security stories seem like they're written by George R.R. Martin and they don't resolve to "happily ever after" conditions. Yes, things can run well for a while, even a good long while, but there comes a day for many a partnership where the parties involved part ways and their products no longer play well with each other.

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

MIAMI — The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s computer systems.

Riviera Beach, a small city of about 35,000 people just north of West Palm Beach, became the latest government to be crippled by ransomware attacks that have successfully extorted municipalities and forced them to dig into public coffers to restore their networks. A similar breach recently cost Baltimore $18 million to repair damages.

Cybersecurity Accountability Spread Thin in the C-Suite

While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go.
A spate of recent surveys offer indications that the philosophy that "cybersecurity is everyone's responsibility" is gaining steam in the C-suite at most large organizations. But digging into the numbers — and keeping in mind perennially abysmal breach statistics — it's clear that while awareness has broadened across the board room, accountability and action are still spread pretty thin.

Missing the Forest for the Trees: Top 5 CISO Pitfalls in Cybersecurity

There is a lack of focus in cyber security.  This rarely stems from lack of hard work, desire, technical ability or aspiration.  Many cybersecurity leaders and teams voice concern around lack of funding, minimal executive support and share all too common stories of burnout at all levels of the organization (including the CISO).  However, these are often symptoms rather than root causes.  Without understanding the root causes, cyber security leaders can miss the forest for the trees — with the company’s true security risk reduction suffering for it.




Svetlana Lyons
Svetlana Lyons

Author



Leave a comment

Comments will be approved before showing up.


Also in Cimetrics News

CyberSecurity Recap October 2019
CyberSecurity Recap October 2019

by Svetlana Lyons October 18, 2019

New Deal Cybersecurity Summit, Future of Cybersecurity, National Security Awareness month, Security Vs Security, Cyberattacks affecting smart buildings and more..

Read More

CyberSecurity Recap September 2019
CyberSecurity Recap September 2019

by Svetlana Lyons September 30, 2019

Cybersecurity Must Be a Priority for Building Owners, Understanding Common Cybersecurity weaknesses in Buildings, Cybersecurity is Everyone's business, U.S. steps up scrutiny of airplane cybersecurity, Cybersecurity summit and more...

Read More

Horizon19 Welcomes Notable Figures in the Clean Economy for International Climate Change Summit
Horizon19 Welcomes Notable Figures in the Clean Economy for International Climate Change Summit

by Svetlana Lyons September 19, 2019

It is a great honor to share this announcement about the upcoming Horizon19, an International Summit, including both the private and public sectors, for the Clean Economy. The event is held September 19-20 at the Boston Convention Center, in Boston, MA, USA.

Read More

cimetrics.com Legal Terms and Conditions

June 29, 2016

cimetrics.com (the "Site") is owned by Cimetrics Inc. ("Cimetrics").

PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THIS SITE.  YOU MAY NOT USE THIS SITE IF YOU DO NOT ACCEPT THE TERMS AND CONDITIONS.

Terms of Use

The information herein provided is for general informative purposes only, and no warranties or representations are made with respect thereto. The information may contain inaccuracies or typographical errors.  The information provided is subject to change at any time, and without notice. Changed information may include, but is not limited to, technical specifications and pricing. Binding declarations are only given after detailed enquiries.

BECAUSE THE INFORMATION IS NOT WARRANTED, ALL LIABILITY FOR THE ACCURACY OF THE INFORMATION IS EXPRESSLY EXCLUDED.

IN NO EVENT SHALL CIMETRICS, ITS OFFICERS, DIRECTORS, EMPLOYEES, PARENTS, AFFILIATES, SUCCESSORS OR ASSIGNS, BE LIABLE FOR ANY DIRECT, INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF USE, DATA OR PROFITS, ARISING OUT OF OR IN ANY WAY CONNECTED WITH THE USE OR PERFORMANCE OF THE CIMETRICS SITE, WITH THE DELAY OR INABILITY TO USE THE CIMETRICS SITE OR RELATED SERVICES, THE PROVISION OF OR FAILURE TO PROVIDE SERVICES, OR FOR ANY INFORMATION, SOFTWARE, PRODUCTS, SERVICES AND RELATED GRAPHICS OBTAINED THROUGH THE CIMETRICS SITE, OR OTHERWISE ARISING OUT OF THE USE OF THE CIMETRICS SITE, WHETHER BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY OR OTHERWISE, EVEN IF CIMETRICS HAS BEEN ADVISED OF THE POSSIBILITY OF DAMAGES. BECAUSE SOME STATES/JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IF YOU ARE DISSATISFIED WITH ANY PORTION OF THE CIMETRICS SITE, OR WITH ANY OF THESE TERMS OF USE, YOUR SOLE AND EXCLUSIVE REMEDY IS TO DISCONTINUE USING THE CIMETRICS SITE.

Passwords

If you have been given a Password in order to gain access to certain information on this Site, or any other affiliates’ website, then you agree, as a condition of receiving said Password, that you shall keep the Password confidential. You shall only disclose the Password to your employees or agents who have a need to know. You are solely responsible for all activities that occur using your Password.

If you become aware of any unauthorized use of your Password, you agree to notify Cimetrics immediately.  Cimetrics reserves the right to revoke your Password access at any time for any reason whatsoever.

Copyrights and Trademarks

All information provided on the web pages of Cimetrics.com is protected by copyright. It is prohibited to copy, process, modify or commercially distribute this information without the express written permission of Cimetrics.

Analytika, Infometrics, Metermetrics, BACstac, BACstac/DN, Secured by Cimetrics™ and BAS-o-matic are trademarks or registered trademarks of Cimetrics.  The Analytika, Cimetrics, Infometrics and Metermetrics logos are trademarks or registered trademarks of Cimetrics.  All other trademarks are owned by their respective companies.

Links to Other Websites

This Site may from time to time contain links to other websites ("Linked Site") or other Internet information sources ("Third Party Source"). These links are provided solely as a convenience to users of this Site and do not constitute an endorsement, sponsorship or recommendation by Cimetrics.  Each Third Party Source or Linked Site may have its own terms of use and privacy policy. Cimetrics is not responsible for the content, availability, or policies of any Linked Site or Third Party Source, or any additional links contained therein.

Privacy

Please read the privacy policy for this Site, which is incorporated into these Terms and Conditions by reference.