Cost of a Data Breach
IBM sponsored the 13th annual cost of a Data Breach study, the industry’s gold-standard benchmark research, which was independently conducted by Ponemon Institute. The infographic depicts some of the key findings.
Importance of Application Whitelisting Strategy for Businesses
Application whitelisting is the practise of specifying an index of approved software applications to run on a computer system. The Australian Cyber Security Centre (Australian Government’s lead on national cyber security) categorises application whitelisting as one of the eight essential cyber risk mitigation strategies.
Having an application whitelisting strategy is crucial for any organisation. The goal of whitelisting is to protect computers and networks from potentially harmful applications by not allowing attackers to place their own executables on the system or replace known good executables with compromised ones. Application whitelisting also prevents zero-day attacks by not allowing execution of any untrusted applications.
Thus, having the right application whitelisting tool in place is key to prevent running of non-trusted applications. Some well-known commercial whitelisting solutions include Airlock Digital, McAfree and Digital Guardian. AppLocker, gatekeeper and Logstash are some of the free tools available for application whitelisting.
Tips to enhance & strengthen passwords
Password security remains one of the most neglected topics in the cyber world. Despite increasing awareness in this space, there are still a number of people using ‘1234546’ or ‘password’ to secure their account! Here are a few basic tips for the general public to strengthen your passwords:
- Avoid predictability: Use nonsense phrases instead of words. Avoid personal information such as name, DOB, anniversary or a pet name. This can significantly enhance the password strength by making it difficult to crack.
- Decrease reliance on the browser: Even though companies such as Google have taken steps to improve password security of their browsers, still most of the browsers don’t promote good password hygiene. One of these practices include ‘auto-filling’ whereby one stores his/her username and password on the browser, for an instant click and log in. Decreasing dependence on the browser can help reduce the chances of a password breach.
- Use a password manager: It is not ideal to use the same passwords on multiple platforms. A password manager gives you the flexibility to be creative with your password phrases and you don't have to remember all of them. Typically, all stored passwords are encrypted, and you just need one master password to access all the passwords.
Australian Utility Week Wrap
Privasec team was in Melbourne this week at the Australian Utility Week Conference.
Privasec's COO, Karan Khosla gave a panel session on the risks around moving to the cloud and our Senior Security Consultant James Cristofaro delivered a presentation on behind-the-meter devices and how to mitigate threats with defense in depth.
A special thanks to the Australian Utility Week team for arranging another fantastic event.
Privasec's APAC Cyber Security Advisor speaks at ISACA Summit in Sydney
Our APAC Cyber Security Advisor, Shamane Tan, was on the panel for the ISACA Summit in Sydney this week. Shamane shared her views on skill shortage in the industry and good hiring practices. Here are a few tips from Shamane:
- Look beyond the obvious.
- Look for transferable skills, potential, passion, curiosity, resilience, integrity in the individual candidate.
- Look for candidates with the ability to pick up new skills on the job.
Other panellists provided their take on the topic, notable mentions include:
- Create diverse teams, consider beyond ethnicity, gender, colour etc.
- Mentoring programs for those with potential to learn and grow into the role.
- Every individual brings something different to the role so keep an open mind when hiring.
A special thanks to the ISACA team for arranging another fantastic event.