Cybersecurity Awareness

Subscriber: Log Out

October is National Cybersecurity Awareness Month! Its mission – to educate the public on the safe, secure use of the internet and our shared global digital assets through the STOP. THINK. CONNECT. campaign.

Why should you care? Because data in and of itself is now viewed by many businesses as a new raw material. As such, securing company information from threats – from both within and without - is critical to the health and future of your company.

Users are demanding that the companies allow them to conduct business anytime, anywhere, through a wide variety of mobile computing devices. As companies succumb to these demands, they find themselves having to support multiple equipment with multiple operating systems, all of which increases the risk to data through targeted attacks such as the Aurora, Stuxnet and Zeus “viruses.” Traditional firewall and proxy security technologies are just not equipped to handle sophisticated threats delivered through what appear to be legitimate websites – Google - and spread rapidly though social media.

Verizon issues an annual Data Breach Investigations Report. In its 2011 report, the top four threat events involve external agents hacking and installing malware to compromise the confidentiality and integrity of servers, regardless of industry or business size. A 2010 survey conducted by CSO Magazine and Deloitte reported that 7 in 10 security incidents go unreported with some companies never even being aware they have been compromised. And 43 percent of the breaches reported in the CSO/Deloitte survey, involved data not known to have existed on the affected equipment, equipment with unknown network connections or accessibility and unknown user accounts or privileges.

IT practices, policies, technologies and initiatives that extend not just between the data center and end user workspace but also to customers, suppliers and business partners are part of the picture. But throwing new and enhanced products to meet each new threat is not the answer. Doing enterprise data protection right necessitates development and implementation of a strong, proactive enterprise-wide information security program encompassing governance, policies and standards, workforce awareness and training.

Next time – Cybersecurity Awareness Part Deux: Getting Your CEO’s Attention

SC
MR

Latest Podcast
Talking Supply Chain: Understanding the FTC’s ban on noncompetes
Crowell & Moring law partner Stefan Meisner joined the Talking Supply Chain podcast to discuss the recent decision by the Federal Trade…
Listen in

About the Author

Martha Lessman Katz, Member of the law firm of Gordon, Feinblatt, Rothman, Hoffberger & Hollander LLC
Martha Lessman Katz

Martha Lessman Katz specializes in data security and privacy, intellectual property,  licensing and technology transactions, eCommerce, social media and other issues relating to the internet.  She is a member of the law firm of Gordon, Feinblatt, Rothman, Hoffberger & Hollander LLC and can be reached at [email protected].

View Martha's author profile.

Subscribe

Supply Chain Management Review delivers the best industry content.
Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals.
×

Search

Search

Sourcing & Procurement

Inventory Management Risk Management Global Trade Ports & Shipping

Business Management

Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance

Software & Technology

Artificial Intelligence Automation Cloud IoT Robotics Software

The Academy

Executive Education Associations Institutions Universities & Colleges

Resources

Podcasts Webcasts Companies Visionaries White Papers Special Reports Premiums Magazine Archive

Subscribe

SCMR Magazine Newsletters Magazine Archives Customer Service