Tel: +1-617-350-7550

Cybersecurity Recap May 2020

May 18, 2020

Curated cybersecurity news

summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.

 

How Hospitals Are Dealing with the Cybersecurity Challenge of COVID-19

Jonathan Langer, CEO of Medigate discusses how healthcare organizations are protecting their digital assets and services during this time. 

Take a look at some of the unique use cases Medigate is seeing when it comes to medical device visibility, as well as how healthcare organizations are leveraging this technology as part of their broader cybersecurity strategies. Learn More

Coronavirus Cybersecurity Concerns Could Add Hurdles to Dealmaking

An article from the Wall Street Journal. The new coronavirus has thrown dealmaking into disarray, and cybersecurity experts say the workplace upheaval caused by the pandemic will complicate mergers and acquisitions when activity picks up. Learn More.

How Technologists Can Translate Cybersecurity Risks Into Business Acumen

Research suggests that 90% of Americans have taken at least one big data security risk in the past year, while a third of Americans – more than twice the global average – have been victims of identity theft. In January, the California Consumer Privacy Act (CCPA) granted the strongest privacy rights to consumers, inciting higher standards for consumer privacy and corporate data hygiene nationwide. Learn More

How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now

Harvard Business Review describes what companies should do once a cyberattack occurs. Companies largely are on their own. They have to scramble to counteract the attack and ensure that the threat actor is out of the system. They then may have to navigate industry regulators, while also trying to steer clear of the dreaded post-breach class-action suit. Read More

The Definitive Cyber Security Statistics Guide for 2020

Cyber attacks continue to grow in both numbers and ferocity — 2019 was just a sign of the things to come. Here’s your list of 122 of the most current cybersecurity industry, cyber attack, and data breach statistics for 2020 and beyond. Read More

Federal watchdog finds chemical facilities vulnerable to cyberattacks

Chemical facilities are vulnerable to crippling cyberattacks due to outdated government cybersecurity guidance, the Government Accountability Office (GAO) concluded in a report released this week. Read More

5 easy steps to immediately bolster cybersecurity during the pandemic

Cyber-attacks have increased exponentially since the start of the pandemic, with AT&T Alien Labs Open Threat Exchange (OTX) finding 419,643 indicators of compromise (IOC) related to COVID-19 from January to March, with a 2,000% month-over-month increase from February to March.
The following are a few short-term, easy-to-implement actions that IT managers can take now to bolster cybersecurity amid the current pandemic. Read More

Cybersecurity In Real Life (Part Three): Moving To Defense In Depth With Security Validation

In cybersecurity, we talk about "defense in depth" as a way to maximize the protection of critical assets, referring to a layered approach to security through people, processes and technology. Defense in depth means companies prevent attacks where they can; where they can't, they leverage tools and processes to detect, alert and perform an effective responseRead More



Leave a comment

Comments will be approved before showing up.


Also in Cimetrics News

July 2020 Newsletter

July 31, 2020

Building Analytics Webinar Video, Reopening Guide for Universities and Schools, Monday Live Industry Conversation, Cybersecurity news
and more...

Read More

Photo by Jorge Jesus from Pexels
Cybersecurity Recap July 2020

July 24, 2020

Cybersecurity Market Expected to Grow, Garmin Ransomware Attack, NIST Cybersecurity Framework, CISOs discuss cybersecurity in the COVID-19 environment and more...

Read More

BACnet Devices, Objects and Properties
BACnet Devices, Objects and Properties

July 10, 2020

The BACnet protocol represents control equipment as a collection of Devices containing Objects. An Object contains a list of Properties that describe its functionality.

Read More