Safely move on from COVID-19

ISMS.online News Roundup – 7th May 2020

NHS Contact Tracing Trial Begins

In this fantastic ResearchLive post, Katie McQuater reveals how the UK government has begun trialling a Covid-19 contact tracing mobile app on the Isle of Wight, ahead of a wider launch if testing is successful. It comes amid concerns from a consortium of more than 100 UK researchers working on cybersecurity and privacy about the NHS launching a contact tracing device.

Read the full article here.

Talking Talent with ISMS.online

WiredSussex has published this excellent interview in which Hannah Jackson speaks with ISMS.online team members about what we’re looking for when hiring new members of staff. Jackson also asks what a typical workday looks like for different team members, as well as the most satisfying aspect of their jobs.

For more on career opportunities with ISMS.online, see here.

Read the full article here.

Information Commissioner sets out new priorities for UK data protection during COVID-19 and beyond

The ICO has published this exceptional blog post from Information Commissioner Elizabeth Denham, outlining the value of regulators applying their authority in the broader social and economic sense. Following the publication of a document clarifying what organisations can expect from us in the months ahead, Denham encourages reflection on the requirements and realities of regulating and engaging how data protection can allow creativity that can respond to the pandemic.

Read the full article here.

Zoom security: I’ve researched problems with video conferencing for years – here’s what you need to know

In this marvellous article for The Conversation, Thomas Reisinger explains how, now that so many people now rely on video conferencing, Zoom has been criticised for the platform’s privacy and protection problems. Despite this, they are far from being the only platform with security concerns.

Read the full article here.

Barracuda: reCaptcha Test New Weapon in Phishing Scams

As more cybercriminals use reCaptcha tests to their benefit in their phishing campaigns, in this wonderful article for ChannelFutures, Edward Gately discusses how working from home can increase the likelihood of being manipulated by such a tactic.

Read the full article here.

Ghost blogging platform suffers security breach

Graham Cluley explains in this superb blog post how the open-source blogging platform Ghost has suffered significant security concerns due to attackers exploiting a crucial flaw in the open-source programme used by their servers in an effort to mine cryptocurrency.

Read the full article here.

Take a New Look at Data Classification

Stephane Charbonneau discusses how debunking misconceptions and assumptions about data classification can go a long way towards creating a clearer vision for robust data security in this insightful article for SecurityInfoWatch.

Read the full article here.

Office Work: Will We Ever Go Back?

In this intriguing article for GovernmentTechnology, as governments remove stay-at-home emergency orders, Dan Lohrmann discusses what will happen as companies contend with what it means to reopen offices, as well as if telework will become the new norm.

Read the full article here.

Google Drive on iPhone just got a big security upgrade: How to set it up

Roland Moore-Colyer explains in this fabulous article for Tom’s Guide how Google has made it safer to access its Drive service on iPhones and iPads by implementing a new Privacy Screen feature that utilises Touch or Face ID to help protect private documents, and how to set it up.

Read the full article here.

Why do we still use passwords?

Despite increasing innovations in authentication, most cyber-attacks and data breaches remain the product of the poor security of passwords. Josh Sims discusses, in this awesome article for Raconteur, why passwords are still commonly used despite increasing numbers of more secure alternatives now available.

Read the full article here.

Are you looking to improve your organisations Business Continuity Management? Having an ISO 22301 compliant BCMS demonstrates to stakeholders that your business continuity capability is appropriate to the scale and scope of your organisation. Business continuity is also an integral part of an Information Security Management System, particularly if you are already working to achieve ISO 27001 certification.

Pull together all your ISO 22301 and BCMS work in one place with ISMS.online’s pre-populated ISO 22301 add-on and range of Business Continuity Management tools. It couldn’t be easier to combine the work you already have done for your ISO 27001 certification project and expand on it, as well as making it possible to do a stand-alone BCMS. 

Corona Virus Impact on Cyber Security Market

Ashish Verma describes the effect of the COVID-19 pandemic on the cybersecurity market in this interesting article for CommunalNews, which has remained forecasted to grow due to the growing emphasis on business continuity plans to provide enhanced security for customer data and operations.

Read the full article here.

Our need to protect cyberspace

The Cyberspace Solarium Commission has published a study on how the cyber readiness of the U.S. government is not designed to operate with the speed and agility needed for defending the nation’s computer networks. In this great SecurityInfoWatch post, Michael Daly discusses how the study proposed a three-tiered security deterrence strategy to reduce the effects of cyberattacks.

Read the full article here.

Tesla Decepticons? Is Automotive CyberSecurity A National Defense Issue?

In this insightful article for Forbes, Rahul Razdan discusses how the US Congress recently published a proposal for a new autonomous vehicle bill, in which there was an increased focus on cybersecurity and what this means for the future.

Read the full article here.

No-stalgia: why cybersecurity can’t keep looking back

With the cybersecurity industry losing the fight with hackers, while cybercriminals continue to advance, the sector keeps looking back to find a solution. In this outstanding article for ITProPortal, Flavius Plesu discusses how cybersecurity strategies commit a disproportionate amount of resources to prepare for the most advanced threat vectors. At the same time, most incidents arise due to simple issues or unforced errors.

Read the full article here.

Half of IT pros believe their cybersecurity teams are ready to detect attacks

This brilliant HelpNetSecurity explains how, according to a recent report, only 51% of technology professionals and leaders are highly optimistic that their cybersecurity teams would be ready to identify and react to rising cybersecurity attacks throughout COVID-19.

Read the full article here.

Malicious Use of AI Poses a Real Cybersecurity Threat

In this exceptional article for DarkReading, Mark Bruce discusses why we should be planning for a world in which artificially intelligent cyber-attacks become more commonplace, by questioning if the same automated cybersecurity technology practitioners are increasingly using to defend their companies, could also fuel attacks.

Read the full article here.

Cybersecurity in the Age of the COVID-19 Remote Worker and Beyond

Employers have traditionally relied on a remote workforce in the short-term. But due to the coronavirus, they recognise that they can function as usual with their workers mostly outside the workplace in the long-term. Brian G. Cesaratto offers ten guidelines for employers, in this excellent article for The National Law Review, as they look forward to the future of securing remote work in their organisations.

Read the full article here.

In The Battle of The Sexes, Women Are Better at Cybersecurity Than Men

In this thought-provoking article for BlackEnterprise, Alisa Gumbs discusses how a new study based on an anonymous survey of 1,400 people in the United States and the United Kingdom has found that women are better at protecting themselves online, as they appear to be more worried about having their accounts hacked and also more frequently use unique passwords.

Read the full article here.

Want To Receive Up-To-Date Articles, Help Materials And Infosec News?

Subscribe to our mailing list to stay informed about all of our latest updates and articles.

GET IN TOUCH

Phone:   +44 (0)1273 041140
Email:    enquiries@isms.online