The Culture, Media and Sport inquiry into the TalkTalk hack has made a number of recommendations to companies to minimise and respond to data breaches including; fining companies should they fail to guard against cyber-attacks, linking CEOs’ pay to effective cyber security as well as jailing those who trade in stolen personal data for up to two years. Carl Leonard, Principal Security Analyst at Forcepoint, has provided the following comment on the recommendations.
Carl Leonard, Principal Security Analyst at Forcepoint:
“The select committee recommendations today serve as another reminder of the need to improve monitoring and protection of corporate data. The reality is that identifying data breaches is difficult and companies do not know they are losing data or where the source of the breach is coming from. Whether it is accidental or malicious data loss, with heavier fines likely to be inflicted on companies that suffer data breaches when the General Data Protection Regulation comes into force, there has never been a more pressing time for businesses to get their security controls in order.
Knowledge is ultimately key when it comes to implementing security measures and businesses have to realise that no-one is safe from getting hacked. Companies must be proactive in their approach to securing their data starting now, which includes taking stock of lessons learned from data breaches of other and taking the necessary measures to better educate their IT departments and employees. Having an established data breach plan in place will help businesses be familiar with the necessary detect, response and recovery phases needed to ensure they limit the effect of an attack.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.