CYBERSECURITY AND PRIVACY WITH FREDERIKE KALTHEUNER: WHAT IS NEEDED


What is needed

Frederike Kaltheuner, Data Exploitation programme lead at Privacy International, talks about profiling, data harvesting, prediction, automated systems, AI, informed decision and the Cambridge Analytica scandal.

Luis Souza

There is no escaping the fact that the way people work is changing and any draconian security measures that don’t enable flexible and agile working will not be effective. Leaders need to find solutions that can offer complete security, while also being easy and practical for all employees to use.

Bogdan Hudzik

In response to Jamyang Khachaturyan

As there are so many ways that attacks and breaches can occur, it is key for any comprehensive security strategy to take advantage of a solution that can cover not just email, but instant messages, SMS, voice and video calls, servers and any documents and files stored on cloud, local and removable storage, across a wide range of devices.

Not only this, organizations also need to consider whether they have the ability to take back, block access to and destroy data if necessary, for example if an employee leaves or if an employee’s phone, which they have been using to access company emails, is lost.

Jamyang Khachaturyan

As there are so many ways that attacks and breaches can occur, it is key for any comprehensive security strategy to take advantage of a solution that can cover not just email, but instant messages, SMS, voice and video calls, servers and any documents and files stored on cloud, local and removable storage, across a wide range of devices.

Jozef Kolar

In response to Zachary MacConnell

Digital security and privacy should be an automatic right for businesses, yet sadly they are not. However, there are ways for organizations to make a stand and take back control, allowing them to enjoy a private and secure digital life.

Solutions – such as Siccura– are available which enable businesses to control all data through a centralized administration system, synchronize all business email accounts, track all business communication and data and encrypt all files.

Zachary MacConnell

Digital security and privacy should be an automatic right for businesses, yet sadly they are not. However, there are ways for organizations to make a stand and take back control, allowing them to enjoy a private and secure digital life.

Simon Winkler

A strong, company-wide sense of security is a vital part of keeping organizations safe from attacks and data breaches. Each employee should be aware of relevant risks and threats and the role they can play in mitigating these.

Baldur Helgason

In response to Lovro Dzvezdan Lam

All too often, people are the weak link in the security chain. This is not always malicious, but human error is a huge cause of cyber-attacks and data breaches. IBM’s 2016 Cyber Security Intelligence Index found that more than 60 per cent of corporate breaches were caused by employees or others from inside the organization. Of these more than 30 per cent were accidental.

Huge issues can arise from something as simple as sending information to the wrong email address, losing a phone or laptop or using default passwords. Then there are also the situations where employees willfully cause security attacks or leak data.

 

 

Lovro Dzvezdan Lam

All too often, people are the weak link in the security chain. This is not always malicious, but human error is a huge cause of cyber-attacks and data breaches. IBM’s 2016 Cyber Security Intelligence Index found that more than 60 per cent of corporate breaches were caused by employees or others from inside the organization. Of these more than 30 per cent were accidental.

Please login or register to leave a response.