We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.
Transformer 02 2014 icône

1.0 by ITWeb


May 31, 2016

À propos de Transformer 02 2014

Français

Transformer 02 2014

In 2012, the hacktivist collective Anonymous broke into the mail server of Syria’s Ministry of Presidential Affairs and accessed the e-mail accounts of a number of officials. A few months later over 2.4 million e-mails from that attack were given to Wikileaks.

In 2013, Barack Obama’s Facebook and Twitter accounts, and the e-mail accounts of his staffers, were hacked by the Syrian Electronic Army. In a non-related story, the Twitter accounts of Burger King, Jeep and Top Gear presenter Jeremy Clarkson were among others compromised during the year. Ironically, in 2013, Anonymous’ Twitter account was also hacked.

In 2014, as millions of soccer fans were watching the Brazilian football World Cup, a much smaller number of local hackivists were taking down the websites of supporting organisations including the Brazilian Intelligence System, Hyundai Brazil, Brazil’s Football Confederation and Bank of Brazil.

More recently, Hollywood’s Jennifer Lawrence and Kirsten Dunst along with The Big Bang Theory’s Kaley Cuoco and countless others all had nude pictures taken from their iCloud accounts and splashed across the internet. And it’s not only ‘big names’ who are targeted by cyber criminals. It’s said that more than 600 000 Facebook accounts are compromised every day.

There are of course many more examples, but it’s clear that cyber security issues have developed into significant problems that now require government and top-level corporate consideration.

A holistic approach is required to mitigate against cyber threats, requiring advanced and evolved identification, protection, detection and response capabilities across the organisation. Is it going to be expensive? Probably. But it’s still less costly than the cost of reparation once security has been breached. And Microsoft’s strategy is to assume breach. Assuming breach requires a shift in mind-set from prevention alone to containment after breach.

As such, managing risk is an important element of your cyber security approach, but before risk can be managed it needs to be identified and prioritised. Elements to consider are whether these risks are being assessed and addressed accordingly and are your staff sufficiently informed of the latest cyber threats? Do you have a cyber security strategy for your business and do you enforce it? Would you truly know if you have been breached? Can your business systems detect the undetectable? Are you doing enough?

With increasingly strict regulations about the safeguarding of information cyber security is certainly now a board-level issue. Businesses tend to think the risk of attack is relatively low, but if it does happen, the impact can be significant.

The outlook is clear: businesses need a proper cyber risk strategy that focuses budget on a holistic approach, one that complies with the five silos of security (identify, protect, detect, response, recover) as identified by the National Institute of Science and Technology. There will always be an element of risk. All people, processes and technology need to be covered by that risk mitigation strategy. And then – and only then – can your business be assured that it has an effective and resilient security architecture.

In this, the second issue of Transformer – the official publication of the CIO Council of South Africa, we take a long, hard look at cyber security, how it interplays with key megatrends, and related issues such as the PoPI Act. We also look at some of the considerations behind a security strategy, what to do in a crisis and how to handle one of the least well-documented threats – the sysadmin going rogue.

We hope you find this publication interesting, useful and thought-provoking.

Please let us know your feedback or questions at [email protected].

Marius Haman and Herman Opperman

Guest editors

Ulrike Weitz

Editor

[email protected]

Quoi de neuf dans la dernière version 1.0

Last updated on May 31, 2016

Minor bug fixes and improvements. Install or update to the newest version to check it out!

Chargement de la traduction...

Informations Application supplémentaires

Dernière version

Demande Transformer 02 2014 mise à jour 1.0

Telechargé par

خرزه زرقا

Nécessite Android

Android 2.1+

Voir plus

Transformer 02 2014 Captures d'écran

Charegement du commentaire...
Langues
Abonnez-vous à APKPure
Soyez le premier à avoir accès à la sortie précoce, aux nouvelles et aux guides des meilleurs jeux et applications Android.
Non merci
S'inscrire
Abonné avec succès!
Vous êtes maintenant souscrit à APKPure.
Abonnez-vous à APKPure
Soyez le premier à avoir accès à la sortie précoce, aux nouvelles et aux guides des meilleurs jeux et applications Android.
Non merci
S'inscrire
Succès!
Vous êtes maintenant souscrit à notre newsletter.