It's said you can't step into the same river twice, and oysters create layers of beauty encapsulating threat. Lessons from both in the growth of individuals and organisations.
Evaluations such as risk are partially built on external threat assessments, regarded as intelligence. Understanding what intel is, what it can do, and what it cannot is foundational to recognise the spectrum of offerings. The following synopsis of intel from a cyber perspective starts a whole new line of inquiry.
Bad actors' use of phishing in many forms to gain access is common. Phishing used against people with vision-related disabilities using assistive technology requires further conversations and considerations.
Organisational inclusion of individuals requiring assistive technology potentially incurs and assumes cyber risks for both parties. Care and consideration must be taken to protect the assistive technology user and the integrating organisation's environment.
Cyber is commonly seen by businesses as a cost center. Changes are afoot that suggest it is increasingly a revenue generator. There are great gains in client relationships to be made if organizations that are not vendors of these services think in a similar way about offering value from their cyber teams' work.
A GIS-style layered approach gives control to correlating data sets. Building layers with questions and considerations aides in making certain the picture we see is accurate. Permissions and transparency are crucial aspects in determining who else has visibility, and helps shifting culture within an organisation. Layer the knowns and unknowns are identified, possibly reduced.
Creating Enduring Ontologies -
With tax season approaching, two shifts in ransomware tactics combined could have more effect than previously seen – targeting of organizations rather than individuals and publishing rather than destroying the victim’s internal data. A dangerous combination, the incorporation of both tactics could force victims to pay the ransom if we are lucky, with impacts from lack of payment potentially severely damaging clients in ways more personal than previously seen. -scl
In a cyber-compromise, security isn't the only risk to consider. How organisations communicate with one another during a cyber incident may impact future relationships. A few considerations taken during another's time of crisis might limit reputational damage.
Prioritisation of client reporting and focus needs to be based on the connection and likelihood of compromise, not based on the clients' relative tiered status. Clients with higher status would likely have better defense. The ones with lower tiered connections may have greater vulnerability.