One of the most recognised risks is third party/ app supplier risks, as they provision the tools used to create your business' client services. Here is how to create a simple path, limiting disruption from a cyber event.
Using traditional intelligence models in private sector often doesn't account for the difference in audience and scope of responses available. By separating the focus between actors and actions, CTI practitioners can focus on delivering actionable intel to decision-makers thus also building the case for cyber as a value generating component of the P&L.
Evaluations such as risk are partially built on external threat assessments, regarded as intelligence. Understanding what intel is, what it can do, and what it cannot is foundational to recognise the spectrum of offerings. The following synopsis of intel from a cyber perspective starts a whole new line of inquiry.
Bad actors' use of phishing in many forms to gain access is common. Phishing used against people with vision-related disabilities using assistive technology requires further conversations and considerations.
Organisational inclusion of individuals requiring assistive technology potentially incurs and assumes cyber risks for both parties. Care and consideration must be taken to protect the assistive technology user and the integrating organisation's environment.
Cyber is commonly seen by businesses as a cost center. Changes are afoot that suggest it is increasingly a revenue generator. There are great gains in client relationships to be made if organizations that are not vendors of these services think in a similar way about offering value from their cyber teams' work.
A GIS-style layered approach gives control to correlating data sets. Building layers with questions and considerations aides in making certain the picture we see is accurate. Permissions and transparency are crucial aspects in determining who else has visibility, and helps shifting culture within an organisation. Layer the knowns and unknowns are identified, possibly reduced.
Creating Enduring Ontologies -
With tax season approaching, two shifts in ransomware tactics combined could have more effect than previously seen – targeting of organizations rather than individuals and publishing rather than destroying the victim’s internal data. A dangerous combination, the incorporation of both tactics could force victims to pay the ransom if we are lucky, with impacts from lack of payment potentially severely damaging clients in ways more personal than previously seen. -scl
In a cyber-compromise, security isn't the only risk to consider. How organisations communicate with one another during a cyber incident may impact future relationships. A few considerations taken during another's time of crisis might limit reputational damage.