Evaluations such as risk are partially built on external threat assessments, regarded as intelligence. Understanding what intel is, what it can do, and what it cannot is foundational to recognise the spectrum of offerings. The following synopsis of intel from a cyber perspective starts a whole new line of inquiry.
Category: Cyber
Phishing the Blind
Bad actors' use of phishing in many forms to gain access is common. Phishing used against people with vision-related disabilities using assistive technology requires further conversations and considerations.
Cyber Considerations for Assistive Technology
Organisational inclusion of individuals requiring assistive technology potentially incurs and assumes cyber risks for both parties. Care and consideration must be taken to protect the assistive technology user and the integrating organisation's environment.
Cyber as part of P&L
Cyber is commonly seen by businesses as a cost center. Changes are afoot that suggest it is increasingly a revenue generator. There are great gains in client relationships to be made if organizations that are not vendors of these services think in a similar way about offering value from their cyber teams' work.
Layering Knowns
A GIS-style layered approach gives control to correlating data sets. Building layers with questions and considerations aides in making certain the picture we see is accurate. Permissions and transparency are crucial aspects in determining who else has visibility, and helps shifting culture within an organisation. Layer the knowns and unknowns are identified, possibly reduced.
Creating Enduring Ontologies
Creating Enduring Ontologies -
Ransomware and Taxes
With tax season approaching, two shifts in ransomware tactics combined could have more effect than previously seen – targeting of organizations rather than individuals and publishing rather than destroying the victim’s internal data. A dangerous combination, the incorporation of both tactics could force victims to pay the ransom if we are lucky, with impacts from lack of payment potentially severely damaging clients in ways more personal than previously seen. -scl
Client/Supplier Comms in Crisis
In a cyber-compromise, security isn't the only risk to consider. How organisations communicate with one another during a cyber incident may impact future relationships. A few considerations taken during another's time of crisis might limit reputational damage.
Narrative Void
If everything is messaging, limited narrative offers options - both from imaginative possibilities uncovered within the audience, and the sharp defensive counters to misinterpretation. When looking to control ther story told, there is value in deniability. -scl
Finding everyone’s value
An effective cyber organisation requires multiple talents, some hidden, some obvious. Leaders in cyber should aim to uncover and conduct the cyber orchestra so as to make it all work together to pre-empt and to resolve cyber challenges.