Get beyond Covid-19 secure with our path to certainty

ISMS.online News Roundup – 23th April 2020

Welcome

COVID-19 data privacy considerations; GAO exposes a lack of cybersecurity plans for four agencies; BSI lays out best business practises; why culture is key to cybersecurity strategy; and much more in this week’s edition of ISMS.online’s Information and Cybersecurity News Roundup!

Combatting COVID-19 through data: some considerations for privacy

Through this excellent blog post for the Information Commissioner’s Office, Information Commissioner Elizabeth Denham discusses how the ICO has created several questions that need to be asked surrounding the protection of data as a result of contact and location data tracking concerning COVID-19. The formulated questions ensure that they consider privacy consequences and that they do not put the public interest and social licence at risk.

Read the full article here.

GAO reveals lack of cybersecurity strategies at four agencies

In this interesting article for Fifth Domain, Andrew Eversden explains how, according to recent reports published by the US the Government Accountability Office, four Cabinet-level departments do not have adequate cybersecurity measures in place. These departments will now work to finalise their risk management strategies and strengthen internal cybersecurity collaboration by this fall.

Read the full article here.

Remote business continuity techniques to implement now

Paul Kirvan discusses the complexities of maintaining business continuity and disaster recovery without on-site staff in this fantastic article for TechTarget, particularly for companies that usually don’t work remotely.

Read the full article here.

Industry 100: a project in data driven security

A member of the Strategic Communications team shares why they joined the i100 programme in this informative blog post for the NCSC, as well as explaining one of the initiatives she’s been working on and why others should also consider joining the scheme.

Read the full article here.

What data breaches teach us about security procedures

The last decade has seen numerous data breaches that exposed millions of personally identifiable information. While companies may face fines and reputational harm due to cybersecurity oversights, there is no stopping of the effect of a data breach. In this excellent TechRadar post, Labhesh Patel discusses why conventional processes of authentication are unreliable, and what the future holds for authentication.

Read the full article here.

Pushing forward digital transformation in healthcare

The NHSX has pulled together teams from the Health and Social Care Department, NHS England and NHS Improvement into one unified entity to drive digital transformation and lead policy, adoption and reform. The excellent Open Access Government article analyses the NHSX’s role in promoting digital change when it comes to health care and social care.

Read the full article here.

IT services giant Cognizant hit by Maze ransomware attack

One of the world’s leading professional services firms, Cognizant, has confirmed that a ransomware attack has hit its systems. Graham Cluley explores the impact of this and the response of the company, in this superb article for Bitdefender.

Read the full article here.

Hackers exploit HMRC Coronavirus Job Retention Scheme with phishing email scam

In this thought-provoking article for TechRadar, Rob Clymo discusses how analysts have seen a significant rise in phishing emails linked to Covid-19 and government assistance packages.

Read the full article here.

Oil and Gas Firms Targeted With Agent Tesla Spyware

In this exemplary article for ThreatPost, Lindsey O’Donnell discusses how cybercriminals have been sending targeted spearphishing emails to oil and gas firms to infect their systems with the spyware Agent Tesla.

Read the full article here.

BSI sets out business best practice to see out COVID-19 crisis

Alex Douglas discusses how the British Standards Institution has released a set of best practise guidelines, in this informative article for Commercial Drone Professional, in a bid to support UK companies during the coronavirus pandemic.

Read the full article here.

ISMS.online offers a dynamic and intuitive set of Business Continuity Management tools that help you prepare for the unexpected, then respond well to it. With our range of tools, you can pull together all your ISO 22301 and Business Continuity Management System (BCMS) related work. ISMS.online enables you to do a stand-alone BCMS or you can integrate all your ISO 22301 with ISO 27001 requirements.

Why a spike in crisis-time cybercrime could be good for cybersecurity

Businesses are facing a surge in cybercrime which is causing cybersecurity to become even more of a priority. In this fascinating article for TechHQ, Jia Jen Low discusses how a rise in demand and increasing spending might see cybersecurity advance amid the COVID-19 pandemic.

Read the full article here.

10 cybersecurity tips for clinicians working from home during the pandemic

In this excellent article for Becker’s Health IT, Jackie Drees discusses how the American Medical Association and the American Hospital Association have established recommendations for health care workers to obey while working from home during the COVID-19 pandemic to ensure proper cybersecurity hygiene.

Read the full article here.

FBI Warning: COVID Research Entities Under Cybersecurity Attack

Christopher Burgess discusses in this excellent article for ClearanceJobs how the FBI has identified state-backed hackers targeting US healthcare and research institutions working on the COVID-19 pandemic.

Read the full article here.

Why culture is essential to cybersecurity strategy

Stephen Burke discusses how digital transformation produces a complicated cyber threat environment in this excellent article for Gigabit, where the right culture is vital for success.

Read the full article here.

14 Tech Pros Predict The ‘Next Big Thing’ In Cybersecurity And Encryption

Cybersecurity is a relentless conflict, and what organisations have overcome today may be obsolete by tomorrow due to its constant evolution. This great post for Forbes Technology Council, 14 experts explore the latest developments and trends that are coming out of the world of cybersecurity, and why they are imperative.

Read the full article here.

Remote working cybersecurity has a big ‘flaw in the plan’

Mark Jones discusses in this excellent article for TechHQ how, in the midst of a budget freezes, spending on cybersecurity technology still remains high, but many organisations ignore a key cause for exploitation, their employees.

Read the full article here.

Continuing to Strengthen International Connections on the Cybersecurity Framework

Amy Mahn explains how, despite operating remotely, NIST still works to support their cybersecurity project in this excellent post for the NIST Cybersecurity Insights blog.

Read the full article here.

365 playlist: How hacking, espionage and ransomware is impacting film and TV

Among threats faced today by broadcasters and network owners include restreaming, password sharing, malware, and content and data theft. Alana Foster rounds up insight and tips from cybersecurity experts in this excellent article for IBC365.

Read the full article here.

Want To Receive Up-To-Date Articles, Help Materials And Infosec News?

Subscribe to our mailing list to stay informed about all of our latest updates and articles.