Get beyond Covid-19 secure with our path to certainty

ISMS.online News Roundup – 2nd April 2020

Contents

Welcome

How safe is Houseparty really; Brits have given up on online privacy; why the COVID-19 pandemic is a hotbed for cyberattacks; cybersecurity deception tactics; and much more in this week’s ISMS.online Information and Cybersecurity News Roundup!

Houseparty: How safe is Epic Games’ video chat app?

Rumours have been circulating that the popular video chat app, Houseparty, has been leaking users information as there has been a rise in the number of users other accounts being hacked. In this brilliant BBC news article, Joe Tidy explores whether the app has indeed been leaking information and the reaction to this.

Read the full article here.

Brits have ‘given up’ on online privacy, and coronavirus could boost scammers

Chris Smith describes how, according to a new study, the British were among the most concerned about their online privacy with 71 per cent more worried than ever, while more than half of those surveyed believe that the ship was sailing when it came to protecting their privacy online. In this excellent article for Trusted Reviews, Smith proceeds to discuss how this may get worse due to concerns around coronavirus.

Read the full article here.

Community groups and COVID-19: what you need to know about data protection

While COVID-19 continues to impact the United Kingdom, more and more people are coming together to helping the most disadvantaged in our communities. Such groups may have to handle and share sensitive personal information with others, and that means taking into account the law on data security. Ian Hulme explains some of the fundamentals of data protection for community groups and charitable organisations about how to follow the legislation in this excellent ICO blog post.

Read the full article here.

White Hats, Security Firms Step Up to Tackle COVID-19 Scams

While the number of cybercriminals trying to capitalise on the pandemic increases, so has the number of security researchers and firms trying to counter this. In this wonderful article for CBR, Claudia Glover discusses how security companies are seeking to defend the global community from COVID-19 scams using the tools, information and experience they have at their fingertips.

Read the full article here.

Coronavirus: Why the pandemic is a hotbed for cyber attacks

James Warrington discusses how security experts are concerned about how as the threat of coronavirus grows so do the possibility of attacks by criminals aiming to target society while it’s vulnerable, in this brilliant article for City A.M. This comes after computer systems in the Czech Republic’s second-largest hospital, and main coronavirus research laboratories started to fail after being struck by a cyberattack.

Read the full article here.

How Huawei is dividing Western nations

Relations between the United Kingdom, the United States and Australia are not normally a talking point in foreign affairs, but concerns about Huawei have caused disruption due to each nations separate approaches to the business. In this interesting article for TechCrunch, Scott Bade discusses what these decisions mean for the future of international relations and national security.

Read the full article here.

Coronavirus: Banks warn on wave of text message ‘smishing’ scams

his excellent article for Sky News examines how the banking industry has warned of a spike in so-called “smishing” scams as criminals are attempting to exploit the coronavirus pandemic. This involves fraudsters using techniques, including spoofing in an effort to trick victims into handing over their bank and other personal information.

Read the full article here.

Five wine tasting tips that should also be applied to network security

In this superb article for ITProPortal, Karl Van den Bergh explores the connexion between the security risks for networks and the art of wine tasting, such as using all you can to evaluate the results, not assuming that you know the outcome, and always keeping an open mind.

Read the full article here.

Face recognition: Privacy concerns and social benefits

News stories and opinion pieces on facial recognition are appearing more and more regularly. For some, the term sounds unnecessarily invasive, but for others, it provides a technology-enabled practical opportunity to combat and win the fight against crime. In this interesting article for SourceSecurity, Jacob Gannon discusses the issues around facial recognition and whether they are legitimate or not.

Read the full article here.

Hotel Breaches on the Rise, Putting Guests, Their Companies at Risk

From the major breach of MGM Resorts to the second security breach of Marriott International Hotel Chain in less than two years, it is clear that hotel breaches are on the rise. In this great article for ChannelFutures, Pam Baker outlines what measures MSSPs can utilize to improve security for hotels and travellers working in other industries, in addition to VPNs and email encryption.

Read the full article here.

World Backup Day: Small data sprawl is not only a challenge, but an opportunity

As World Backup Day was this week, changing data environment calls for a modern approach to data protection, backup teams have a rare opportunity to use emerging technologies to simplify security, communicate with business and offer more value than ever before. Stephen Manley explains what you need to know about this World Backup Day in this excellent ITProPortal post.

Read the full article here.

Edinburgh fintech offers secure email service for free to combat rise in cybercrime

In this outstanding article for The Scotsman, Hannah Burley discusses how an Edinburgh-based fintech company is teaming up with a cybersecurity expert to offer its services free of charge during the coronavirus pandemic after authorities alert companies and the public of a growing danger from cybercriminals.

Read the full article here.

Are you looking to improve your organisations Business Continuity Management? Having an ISO 22301 compliant BCMS demonstrates to stakeholders that your business continuity capability is appropriate to the scale and scope of your organisation. Business continuity is also an integral part of an Information Security Management System, particularly if you are already working to achieve ISO 27001 certification.

Pull together all your ISO 22301 and BCMS work in one place with ISMS.online’s pre-populated ISO 22301 add-on and range of Business Continuity Management tools. It couldn’t be easier to combine the work you already have done for your ISO 27001 certification project and expand on it, as well as making it possible to do a stand-alone BCMS. 

Keeping your business cybersafe during the pandemic

As most of the workforce has shifted to work remotely, you may think it’s too late to introduce a new IT policy but it’s never too late to improve yours! In this excellent ITProPortal post, Stephen Salinas offers advice on three easy but important policy measures that can be followed by your remote workers.

Read the full article here.

Romania: From ‘Hackerville’ to Cybersecurity Powerhouse

In this fascinating article for BalkanInsight, Marcel Gascón Barberá discusses how Romania has become one of the largest talent pools for cybersecurity and its innovation, after having hackers put Romania on a global online map.

Read the full article here.

DCMS Cyber Security Breaches Survey 2020 shows half of UK businesses faced cyber security issues

The UK Department of Culture, Media and Sport, as part of their Cyber Security Breaches Survey 2020, announced that almost half of the country’s companies have suffered cybersecurity breaches or assaults over the last 12 months, as cyber threats have not only progressed but have also become more frequent. This great article for Government Computing discusses this as well as the other results of this study.

Read the full article here.

The Wild, Wild West(world) of Cybersecurity

There are risks everywhere in the world of cybersecurity. In this brilliant article for Dark Reading, Bil Harmer discusses the similarities between the Wild West and contemporary cybersecurity concerns by using HBO’s “Westworld” as an allegory to the current landscape.

Read the full article here.

Cyber volunteers needed to help protect our health services during the Coronavirus outbreak

Graham Cluley discusses how an organisation, Cyber Volunteers 19 (CV19), is set up to support volunteers with their IT security skills to medical services in this exciting blog post.

Read the full article here.

Deception Tactics in Cybersecurity: Human Lab Rat

As cybersecurity technology matures, we continue to borrow tested approaches from more conventional security industries. In this excellent article for CISO Mag, Dick Wilkinson discusses how deception has been a defensive technique for military and intelligence programmes for hundreds of years, and how it can be used in cybersecurity strategies.

Read the full article here.

Cybersecurity Cloud Transition Likely to Accelerate

Michael Vizard discusses how, with more cybersecurity professionals being forced to work from home, the speed at which data security applications have been transitioning to the cloud could be accelerating, in this wonderful SecurityBoulevard post.

Read the full article here.

The most resilient organizations follow outcome-based cybersecurity

As the cyber landscape evolves, so does the definition of cybersecurity. In this interesting article for Fifth Domain, John Cosby discusses how using a more holistic outcome-based approach may be stronger than a compliance-based approach.

Read the full article here.

A look at cybersecurity in healthcare and the push to safeguard patient data

For years, the healthcare sector has been engaged in efforts to combat cybersecurity challenges with mixed success. In this excellent article for MedCityNews, Stephanie Baum discusses how cybersecurity has progressed in healthcare, what problems remain, and how the healthcare sector faces cybersecurity threats both internally and externally.

Read the full article here.

The UK Cabinet is meeting on Zoom… here’s the meeting ID

In this superb post, Graham Cluley explains how the UK Prime Minister announced on Twitter that he was chairing the first-ever digital Cabinet, but the screenshot he posted along with this shows the Zoom Call ID meeting. The implications of this demonstrate just how important it is to think about your cybersecurity in everything that you do as we increasingly rely on online applications.

Read the full article here.

This Week in Tweets

Here are our top tweets of this week from the #infosec and #cybersecurity twitterverse.

Want To Receive Up-To-Date Articles, Help Materials And Infosec News?

Subscribe to our mailing list to stay informed about all of our latest updates and articles.