Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Becky Nicholson
Data Privacy Consultantfeature_status*/ ?>
Bridewell Consulting

Comments Dotted : 3
April 02, 2020

Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach

Technical defence is still paramount, and in particular, regular penetration testing is vital.
With the sheer volume of data breaches in recent time, we’re at risk of becoming numb to the danger these attacks pose. All organisations, including Marriott International, must take steps to protect their systems and ultimately customer data. This means taking basic steps such as putting in place regular security assessments, a strong patching and password policy, and enforcement of multi-factor authentication on every public facing system. These are not silver bullets but can go a long way.....Read More
With the sheer volume of data breaches in recent time, we’re at risk of becoming numb to the danger these attacks pose. All organisations, including Marriott International, must take steps to protect their systems and ultimately customer data. This means taking basic steps such as putting in place regular security assessments, a strong patching and password policy, and enforcement of multi-factor authentication on every public facing system. These are not silver bullets but can go a long way to improving security. Technical defence is still paramount, and in particular, regular penetration testing is vital. But it is also just as important to test employee awareness. Employees will always be the weakest link but with the right education can be an organisation’s biggest asset in terms of defence. Such employee awareness training can also be measured by regular phishing or red team assessments.  Read Less
Like(4)  (0)

Linkedin Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Technical defence is still paramount, and in particular, regular penetration testing is vital. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Technical defence is still paramount, and in particular, regular penetration testing is vital. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 21, 2020

Personal Details Of 10.6M MGM Hotel Guests Posted On A Hacking Forum – Cybersecurity Experts React

Such employee awareness training can also be measured by regular phishing or red team assessments.
We are in danger of becoming numb to data breaches, due to the frequency and scale they are being reported. All organizations must take steps to protect their systems and ultimately customer data. This means taking basic steps such as putting in place regular security assessments, a strong patching and password policy, and enforcement of multi-factor authentication on every public-facing system. These are not silver bullets but can go a long way to improving security. At this stage, it’s not .....Read More
We are in danger of becoming numb to data breaches, due to the frequency and scale they are being reported. All organizations must take steps to protect their systems and ultimately customer data. This means taking basic steps such as putting in place regular security assessments, a strong patching and password policy, and enforcement of multi-factor authentication on every public-facing system. These are not silver bullets but can go a long way to improving security. At this stage, it’s not clear how the hacker managed to gain access to MGM’s cloud server. However, technical defense is still paramount, and in particular, regular penetration testing is vital. It’s also just as important to test employee awareness. Employees will always be the weakest link but with the right education can be an organization’s biggest asset in terms of defense. Such employee awareness training can also be measured by regular phishing or red team assessments.  Read Less
Like(1)  (0)

Linkedin Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Such employee awareness training can also be measured by regular phishing or red team assessments...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/personal-details-of-10-6m-mgm-hotel-guests-posted-on-a-hacking-forum-cybersecurity-experts-react

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Such employee awareness training can also be measured by regular phishing or red team assessments...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/personal-details-of-10-6m-mgm-hotel-guests-posted-on-a-hacking-forum-cybersecurity-experts-react

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 09, 2020

Response Comment: Travelex Foreign Currency Website STILL Down After 4 Days Following Cyber Attack

Travelex has certain obligations as a controller under Data Protection legislation.
Following the Travelex ransomware attack, the company made the decision to take down its website, yet customers have not been directly informed if their personal data has been compromised. There are also conflicting reports on whether customer data has been lost. Travelex has certain obligations as a controller under Data Protection legislation. One of which is to report personal data breaches to the supervisory authority. It is important, however, to ascertain to whom the data belongs.....Read More
Following the Travelex ransomware attack, the company made the decision to take down its website, yet customers have not been directly informed if their personal data has been compromised. There are also conflicting reports on whether customer data has been lost. Travelex has certain obligations as a controller under Data Protection legislation. One of which is to report personal data breaches to the supervisory authority. It is important, however, to ascertain to whom the data belongs and where it is being processed, so as to determine the jurisdiction. It may be that the breach is covered by the General Data Protection Regulation (GDPR); if so, Travelex will need to assess if the breach needs to be reported to the supervisory authority and do so within 72 hours but also to the National Cyber Security Centre (NCSC). Travelex must also evaluate the likelihood of the breach resulting in a high risk to the rights and freedoms of the customers and inform them without “undue delay”. When assessing a risk to the rights and freedoms, it is important to focus on the potential negative consequences for the individual. This must be based on how serious or substantial they are and how likely they are to happen. Helpfully, when reporting a personal data breach to the UK’s regulator, the Information Commissioner’s Office (ICO), they will offer advice about whether the individuals involved need to be informed. There have also been reports that Travelex was recently warned about vulnerabilities in its virtual private network (VPN) servers. This may also have implications for the company as the GDPR imposes other obligations to implement appropriate technical and operational measures to ensure a level of security appropriate to the risk. This will include such things as regular penetration tests to check for such vulnerabilities.  Read Less
Like(1)  (0)

Linkedin Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Travelex has certain obligations as a controller under Data Protection legislation. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/response-comment-travelex-foreign-currency-website-still-down-after-4-days-following-cyber-attack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Becky Nicholson, Data Privacy Consultant, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Travelex has certain obligations as a controller under Data Protection legislation. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/response-comment-travelex-foreign-currency-website-still-down-after-4-days-following-cyber-attack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel