History repeats itself. Could we use the lessons from the first time around? At the height of ransomware attacks, people responsible for oil rigs and ships in the sea find themselves to be the next potential target. Let me explain.
Predicting the future may sometimes seem an impossible task, especially given the speed with which our world and the world of cybersecurity changes, but there are already signs of two major shifts coming in 2022 that you need to have on your radar.
Without a doubt, international business travelers face a high risk of cybersecurity breaches. If you travel for work, you’ll likely have to do business on more than one device, including laptops and smartphones. If your trip is for pleasure, you might use a phone or tablet to share special moments and keep in touch with folks back home. The information on your computer or mobile device is sensitive, and you don't want it to fall into the hands of the wrong person.
Suppliers are mission-critical partners for business success. Unfortunately, too often, an “arm’s length” relationship creates problems that are revealed only after it’s too late.
When suppliers feel conversations only occur after poor performances, the opportunity to have a productive, collaborative conversation may already be over.
Automation has become quite the norm across all industries. However, modern automation places a premium on interconnectedness. So it's no surprise that cyber risks are on the rise. It also means there's a greater probability of danger for every party involved.
The year that started the global pandemic also brought more than just the coronavirus. The world became acutely aware of the weak links within the global supply chain. At the onset, product and people movements were challenging. We saw supply shortages not entirely driven by hoarding behavior, but because the supply chain was stuck.
The question became this: How do we get people and products moving safely, without jeopardizing employees’ health, safety and well-being, as well as customers?
Organizations in the healthcare industry have always been a target for cyberattacks. Since the COVID-19 pandemic struck and sent the healthcare industry into chaos, the number of cyberattacks and attempts has increased exponentially.
After a bumper crop of cyber incidents last year, 2021 is seeing more small businesses turn to outsourced providers for security services than ever. 2020 saw a 20% growth in hacking attempts faced by U.K. businesses, made worse by an increase in attack complexity.
Digital transformation is the phrase on everyone’s lips – for good reason. It enables organizations to better manage operations, enhance profit margins, and ensure the efficient transfer of goods and information between supply chain nodes. As a procurement professional, you’re on the front line of this process. This is also why you need to be the first line of defense.
Detecting the SolarWinds Hack
The cybersecurity world has been overtaken with concern over a state-sponsored cyberattack perpetrated by Russian intelligence agents against multiple federal agencies, including those responsible for our nuclear stockpile. Prominent cybersecurity firms such as Microsoft and FireEye, who were also victims of the attack, were the first to identify it.
In June 2020, in response to the coronavirus, President Trump signed an executive order to freeze access to new H-1B visas for professional and technology workers doing business in the U.S. This has a huge impact, considering in 2019 about 139,000 new H-1B petitions were approved, joining 250,00 which were extended.
Data security is a significant issue of concern for both small and large organizations. As an organization holds onto data collected from customers and vendors, it should be wary of the threat posed by cybercriminals. There are several standards that you should comply with when it comes to information security. ISO 27001 is one such standard.
There’s something that has been revolutionizing our world without us even noticing it. A technological device that promises to create a new way to encrypt information and process data. This technology is called quantum computing. This isn’t something easy to understand at first, but once we know the science behind it, we’ll be able to see the benefits this could bring to our society.
While the rapid shift to a remote workforce model in the wake of the COVID-19 pandemic has driven many changes for businesses around the world, a few constants have grown in importance. To maintain operations as seamlessly as possible, organizations must secure their payment systems, technology access, and sensitive customer data no matter where it resides, and that is particularly true when it is being accessed or processed by employees from their homes.
The constant cyber threat has completely changed the way boards around the world approach risk. A robust cybersecurity posture is no longer a “nice-to-have” but a business priority, especially at a time of almost pervasive threats. As the need to protect customer data grows, business leaders have been attempting to work out how best to respond to this new reality, and, most importantly, whose responsibility it should be.