Category Archives: Internet Security
Section 230 heads to the Supreme Court – Columbia Journalism Review
For the past several years, critics across the political spectrum have argued that Section 230 of the Communications Decency Act of 1996 gives social-media platforms such as Facebook, Twitter, and YouTube too much protection from legal liability for the content that they host. Conservative critics argue, despite a lack of evidence, that Section 230 allows social-media companies to censor likeminded thinkers and groups without recourse, and liberal critics say the platforms use Section 230 as an excuse not to remove things they should be taking down, such as misinformation and hate speech. Before the 2020 election, Joe Biden said he would abolish Section 230 if he became president; since taking office, he has made similar statements, including that the clause should be revoked immediately.
This week, the Supreme Court announced that it would hear two cases that are looking to chip away at Section 230 legal protections. At the core ofone case is the claim that Googles YouTube service violated the federal Anti-Terrorism Act by recommending videos featuring the ISIS terrorist group, and that these videos helped lead to the death of Nohemi Gonzalez, a 23-year-old US citizen who was killed in an ISIS attack in Paris in 2015. In the lawsuit, filed in 2016, Gonzalezs family claims that while Section 230 protects YouTube from liability for hosting such content, it doesnt protect the company from liability for promoting that content with its algorithms. The second case involves Twitter, which was also sued for violating the Anti-Terrorism Act; the family of Nawras Alassaf claimed ISIS-related content on Twitter contributed to his death in a terrorist attack in 2017.
In recent years, the Supreme Court has declined to hear similar casesincluding, in March, a decision by a lower court that found Facebook was not liable for helping a man traffick a woman for sex. While Justice Clarence Thomas agreed with the decision not to hear that case, he also wrote that the court should consider the issue of the proper scope of immunity under Section 230. Assuming Congress does not step in to clarify Section 230s scope, we should do so in an appropriate case, Thomas wrote. It is hard to see why the protection that Section 230 grants publishers against being held strictly liable for third parties content should protect Facebook from liability for its own acts and omissions.
Thomas has made similar comments in a number of other decisions. In 2020, the Supreme Court declined to hear a case in which Enigma Software argued that MalwareBytes, an internet security company, should be liable for calling Enigmas products malware. Although he agreed with that decision, Thomas went on at length about what he described as a movement to use Section 230 to confer sweeping immunity on some of the largest companies in the world. He also suggested he agreed with an opinion from a lower-court judge, in a case in which Facebook was sued for terrorist content. The opinion said it strains the English language to say that in targeting and recommending these writings to users Facebook is acting as the publisher of information provided by another information content provider.'
Jeff Kosseff, a cybersecurity law professor at the US Naval Academy and the author of a book on Section 230, told the Washington Post that, with the Supreme Court considering these questions, the entire scope of Section 230 could be at stake. The Post also noted that it will be the first time the court has considered whether there is a distinction between content that is hosted and content recommended by algorithms. Eric Goldman, co-director of the High Tech Law Institute at Santa Clara University, told the Post that such a division is actually a false dichotomy, and that the process of recommending content is one of the traditional editorial functions of a social-media network. In that sense, he told the Post, the question presented goes to the very heart of Section 230.
While Section 230 gets most of the attention, it isnt the only protection the platforms have. A feature on hate speech in the New York Times described Section 230 as the main reason why such speech exists online, but later added a correction clarifying that the First Amendment also protects online speech. Even if the Supreme Court decides Section 230 doesnt protect the platforms when it comes to terrorist content, Facebook and Twitter could argue with some justification that the First Amendment does. To the extent that people want to force social media companies to leave certain speech up, or to boost certain content, or ensure any individuals continuing access to a platform, their problem isnt Section 230, Mary Anne Franks, a professor of law at the University of Miami, said during a discussion of Section 230 on CJRs Galley platform last year. Its the First Amendment.
This argument is at the heart of another case the Supreme Court was recently asked to hear, involving a Florida law designed to control how the platforms moderate content. The law was struck down by the Eleventh Circuit Court of Appeals in May as unconstitutional, since the court ruled that moderation decisions are an exercise of the platforms First Amendment rights. A similar law passed in Texas, however, was upheld in a decision earlier this month, one that explicitly rejected the First Amendment defense. Now the Supreme Court has the opportunity to decide the extent to which Section 230 and the First Amendment cover the platforms moderation and content choices.
Heres more on Section 230:
Other notable stories:
TOP IMAGE: Members of the US Supreme Court. Erin Schaff/The New York Times via AP
Visit link:
Section 230 heads to the Supreme Court - Columbia Journalism Review
Save over 60% with this exclusive Trend Micro security deal – TechRadar
When it comes picking the best antivirus and online security software, Trend Micro may not be the first name you think of - despite having passed at full marks the latest AV-Test (opens in new tab) checks on both PC and mobile. And, the good news is that you won't even have to invest the big bucks to enjoy its top-notch protection.
Usually costing $129.95 for a one-year subscription, Trend Micro Premium Security suite now comes with a 53% discount dropping to just $59.95 (opens in new tab) for a full protection of up to 10 devices at once.
If that would not be enough of a bargain, TechRadar readers have even the chance to lower the price down by a further 10%. How? Simply add the exclusive code techradar10at the checkout. This breaks down to a total saving of more than $75.
The Premium Security suite is packed with a huge array of security features and tools to secure your devices against almost all the dangers you can face online: from viruses and ransomware to online scams, malicious websites, data leaks and identity theft.
Keep reading for more details about this tempting offer and a closer look to all the features included with the Trend Micro Premium Security plan.
This security package covers up to 10 devices at the same time with a single subscription - no matter if you are using a Windows, Mac, Android, iOS or Chromebook. Here's a sample of the features you get with the Trend Micro Premium Security suite:
Laptop security: full protection for your Windows, Mac and Chromebook device against ransomware, viruses, and dangerous websites.
Mobile security: prevent malicious apps, ransomware, unprotected Wi-Fi, and dangerous websites from infecting both your Android and iOS smartphone.
Password Manager: say goodbye to vulnerable passwords and keylogging malware, measuring password strength and keeping these secure.
Anti-scam tool: enhanced protection against internet or email scams, and from fraudulent websites attempting to steal your financial and personal data when shopping and banking online.
Performance optimization: helps you to identify and fix common problems with your system that may be slowing down your devices.
ID security: get notifications if personal information like email address, credit card number, passwords, or bank account details are found on the dark web.
Personal VPN: secure and encrypt your online connections and communications with its VPN Proxy One Pro, especially when you connect to a public Wi-Fi.
Premium support: enjoy the support of security experts with its 24/7 technical customer service, PC security health check, remote diagnosis and repair.
Today's best Trend Micro Premium Security Suite deals
See more here:
Save over 60% with this exclusive Trend Micro security deal - TechRadar
Global cyber security revenue to hit $334B by 2026 – ARNnet
The global cyber security market is set to reach US$334 billion in revenue by 2026, with the Asia Pacific (APAC) region predicted to lead the way for growth.
On a global scale, cyber security revenue is expected to rise by a five-year compound annual growth rate (CAGR) of 8.7 per cent, up from 2021s US$220 billion, according to data and analytics firm Global Data.
Meanwhile, Asia Pacific. was framed by GlobalData as being more vulnerable to cyber threats than other regions due to critical infrastructure and the growing financial sector in the region, as well as being expected to lead cyber security growth around the world.
Indeed, an increase in digital transformation initiatives, penetration of internet connectivity and susceptibility stemming from internet of things (IoT) connectivity is expected to increase the adoption of cyber security solutions.
Madhumita Chaudhary, practice head at GlobalData, said Australia, Singapore, the Philippines, Thailand, Japan, India and Taiwan are particularly facing an increase in ransomware, phishing and network attacks.
As such, these countries are anticipated to see strong demand for cyber security products and services.
The global enterprise cyber security market in particular is expected to thrive following a surge in the volume and sophistication of cyber attacks across organisations.
Despite the continued investments and growth in the cyber security space, the frequency of attacks and breaches have shown no signs of abatement, said Chaudhary.
More than billions of records containing critical information were compromised since the pandemic. As such, enterprise cyber security will continue to dominate the overall cyber security demand in terms of market share, capturing a sizeable revenue share exceeding 90 per cent in 2021.
Additionally, the consumer cyber security markets CAGR is expected to reach 10 per cent over the period.
The rapid emergence of connected devices and associated security risks with no baseline security upgrades will favour the segment growth over the forecast period, Chaudhary said. Cyber security should be at the forefront of all digital transformation strategies. A lapse in focus could mean hefty repercussions in form of accelerated ransomware attacks, she added.
The growth in the cyber security market from now to 2026 comes as fellow research firm Forrester claimed that customers are set to increase their reliance on managed security service providers (MSSP) in 2023.
Error: Please check your email address.
Tags GlobalData
Read more:
Global cyber security revenue to hit $334B by 2026 - ARNnet
Up to 200000 available to test security of smart devices used by nearly all UK businesses – GOV.UK
Successful bidder will research potential vulnerabilities in popular devices to better protect against cyber risks
Findings will help make sure current security measures and guidance are robust enough for evolving threats
Organisations can now apply for funding to support research into the cyber security of office devices which can connect to the internet, such as printers, cameras, and room booking systems, to ensure they are properly protected against hackers.
Thousands of UK businesses rely on these products, known as enterprise Internet of Things (IoT) devices, to increase productivity and enable hybrid working. The government is funding new research to uncover vulnerabilities in these commonly used enterprise IoT products and assess the cyber resilience of these devices.
Smart devices in the workplace can collect sensitive data which can be accessed by other users, making them an attractive target for cyber criminals to exploit. While devices may have some protections built-in, products with poor cyber security can leave companies using them at risk.
For example, in 2019 Microsofts researchers found Russian hackers were compromising conference phones and office printers in organisations across many sectors, though Microsoft was able to successfully block the attacks before they could cause any damage.
The successful bidder will be awarded up to 200,000 to test popular devices and help identify if current security measures and guidance, such as international standards and NCSC device security principles, are robust enough to protect businesses from evolving threats.
Cyber minister Julia Lopez said:
Technology played a pivotal role in keeping British businesses going during the pandemic, helping the pivot to hybrid working and boosting productivity ever since.
This research will ensure we have the right measures in place to protect our economy and keep our offices and workers safe from cyber security threats.
The grant is part of the governments 2.6 billion National Cyber Strategy to protect the UK from cyber threats and grow the digital economy. It supports the UKs objective to take the lead in the technologies vital to cyber power and secure the Internet of Things and connected technologies used by consumers and enterprises.
This work complements the Product Security and Telecommunications infrastructure bill (PSTI) going through parliament which strengthens the cyber resilience of consumer IoT devices, such as smart speakers and smart TVs.
Notes to editors
Further details about this grant can be found here.
Read more:
Up to 200000 available to test security of smart devices used by nearly all UK businesses - GOV.UK
There’s been a big rise in hackers targeting Google Chrome – doing this one thing can help protect you – ZDNet
Image: Getty/gilaxia
Cyberattacks targeting vulnerabilities in internet browsers are on the rise with Google Chrome increasingly in the hackers' sights.
According to analysis by cybersecurity researchers at WatchGuard, the second quarter of this year saw an overall 23% increase in malware attacks against browsers Chrome, Firefox, and Internet Explorer compared with the previous quarter.
Much of that increase has been driven by a rise in cyberattacks on Chrome: according to the WatchGuard Threat Lab Internet Security Report, attacks targeting Google's browser have increased by 50%.
Browsers are of interest to hackers because they're key to how we use the internet entering and storing information including passwords, cookies, and even credit card details. This makes them a target for information-stealing malware.
Also:The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats
All of this information is useful for cyber criminals, either to exploit themselves or sell on dark web forums for others to use. For example, stolen passwords for corporate cloud services could be used to help launch significant cyberattacks, including ransomware campaigns, while stolen card details could be used to drain people's bank accounts.
Researchers suggest that one reason for the increase in attacks targeting Chrome could be the persistence of various zero-day exploits.
There have been several instances of these high-severity Chrome vulnerabilities this year, including CVE-2022-1364,CVE-2022-2294 and CVE-2022-307. Google warned that the latter was actively being used to conduct cyberattacks, and Chrome browser users on Windows, Mac and Linux were told to apply the relevant security update immediately.
However, researchers suggest that the rise on Chrome attacks might partly be due to the fact that many browsers aren't receiving the updates, particularly if security patches aren't automatically being applied by administrators. Without these updates, browsers arehighly vulnerable to attacks.
Ensuring that critical security updates are applied as soon as possible is one of the best strategies when it comes to protecting against cyberattacks targeting browsers or any other software.
"All it takes is one unpatched vulnerability for an attack to squeeze through a crack in your defenses. Keeping your software updated with the latest security patches is one of the single best actions you can take in terms of bang for your buck in cyber defense," said the WatchGuard report.
NCC-CSIRT Issues Advisory To Users On Internet Security Component And Customizing News Feed In Microsoft Edge Browser – Tech Build Africa
The Nigerian Communications Commissions Computer Security Incident Response Team (NCC-CSIRT) has issued an advisory for users to install trusted, up-to-date anti-virus software with an Internet security component and to customize News Feed in Microsoft Edge Browser.
This is part of the countermeasures to lessen the chances of falling for a malicious attack that has been discovered in the browser.
The NCC-CSIRT further advised users of the browser to practice safe Internet browsing habits and to refrain from clicking on links they are unsure of in the face of the malicious attack that has been rated as high in probability and potential damage to systems.
The advisory stated that the malicious advertising campaign, unearthed on the Microsoft Edge Browser News Feed, redirects victims to fraudulent tech support websites and that cybercriminals have resorted to posting bizarre, attention-grabbing stories or advertisements on the Edge news feed to entice users to click on them.
The malicious advertisements appear legitimate but contain malware and/or other threats.
According to the advisory, The Microsoft Edge News Feed is the default page that appears when a new tab is opened, and it displays information such as news, advertisements, weather, and traffic updates.
The following are the steps that result in being redirected to a bogus tech support page:
The user clicks on a story or advertisement, the Edge browser setting is analysed for various metrics;
Based on the aforementioned metrics and prior results, if the user is adjudged to be a bot or in a location that is not of interest, the user is redirected to a harmless dummy page that is relevant to the story or advertisement initially clicked on;
However, if the user is adjudged a potential victim, then the user is redirected to a tech support scam website for further exploitation. The advisory explained.
Victims of the tech support website scam could have their Personally Identifiable Information (PII) and other data harvested or they could be with malware.
The NCC, therefore, urges telecom consumers and other stakeholders in the ecosystem to install up-to-date AntiVirus software and be alert to the wiles of cybercriminals in order not to fall victim to cyber scams.
The Computer Security Incident Response Team (CSIRT) is the telecom sectors cyber security incidence centre set up by the NCC to focus on incidents in the telecom sector and as they may affect telecom consumers and citizens at large.
The CSIRT also works collaboratively with the Nigeria Computer Emergency Response Team (ngCERT), established by the Federal Government to reduce the volume of future computer risk incidents by preparing, protecting, and securing Nigerian cyberspace to forestall attacks, and problems or related events.
Dont miss important articles during the week. Subscribe totechbuild.africa weekly digestfor updates.
See the article here:
NCC-CSIRT Issues Advisory To Users On Internet Security Component And Customizing News Feed In Microsoft Edge Browser - Tech Build Africa
The New Cybersecurity Motto: Trust is Not an Option – CIO
The discovery of theLog4j vulnerabilityin December 2021 is one of the more recent and prominent reminders of why cybersecurity teams need to implement a zero-trust security architecture.
Not that they should need reminders. Incidents are happening every day, and some of themsuch as ransomware attacks that impact entire supply chainsmake the headlines. In the case of Log4j, a Java-based logging utility thats part of the Apache Logging Services, security researchers found a zero-day securityvulnerability involving arbitrary code execution.
This was no garden variety vulnerability. Security experts described the flaw as being one of the biggest and most critical discovered in recent years. And it provides a glaring example of how at-risk organizations can be. New software vulnerabilities are being uncovered all the time, some of them leading to serious security breaches and lost data.
As cybersecurity and IT leaders know all too well, the complexities of security have increased significantly in recent years. Not only are attacks getting increasingly sophisticated, but cybercriminals are more organized than before, in some cases well-financed by nation-states.
In addition, the attack vector has broadened considerably in recent years. Hybrid and remote work models mean more people are working remotely and, in many cases, are using their own devices and networks to access critical business data.
Furthermore, the use of cloud services and multi-cloud strategies continues to increase. Sometimes cloud deployments are not even on the radar of central IT and therefore not managed as other IT assets might be. Given the rise of cloud services, remote work, and mobile environments, the concept of perimeter defense has been obliterated. There really is no such thing as a perimeter, or perimeter defense, anymore.
All of these developments provide good reasons for organizations to shift to a zero-trust model of cybersecurity. The idea of zero trust is fairly simple: trust no user or device, and always verify. A successful zero-trust approach considers three things: a users credentials, the data the user is trying to access, and the device the individual is using.
By combining the principle of least privilege with a modern approach of contextual access, multi-factor authentication (MFA), and network access, organizations can maintain a more agile security model that is well suited for a cloud-heavy and mobile-centric environment.
The result of the zero-trust approach is that organizations can reduce their attack surface and ensure that sensitive data can only be accessed by those users that need it under approved and validated context. This serves to greatly reduce risk.
Traditional zero-trust practices have typically focused on network access and identity and access management (IAM) through single sign-on (SSO). With remote work now encompassing such a large portion of end-user access, however, device posture is increasingly important as devices act as the new perimeter in a perimeter-less world.
By adding device validation to their security protocol, enterprises can defend against criminals who steal credentials or devices and use them along with MFA to gain access to networks and data.
If a network environment is monitored for non-compliance or critical vulnerabilities, then securing the device is the last defense against having compromised sensitive data. This is why its so important to adopt aconverged endpoint management solutionas part of the zero-trust approach.
Here are some of the key components of a zero trust practice organizations should consider:
Along with deploying the zero-trust approach, organizations should be sure to pay heed to security fundamentals. For example, they need to patch vulnerabilities as soon as they are identified. The Log4j development showed why that is important.
Patches should be installed and updated, but not in a haphazard way. Comprehensivepatch-management programsshould encompass all devices used in the organization connected to the internet and corporate networks.
Another good practice is to reassess all endpoints where systems are vulnerable to attacks. This includes conducting an audit of all those systems and devices that have administrative access to network systems, and an evaluation of the security protections on any sensors or other internet of things (IoT) devices tied to networks.
On a longer-term basis, companies need to reassess how they gather, store, and categorize the growing volumes of data they are managing. That might mean segmenting data so that more stringent security controls are placed on access to the most sensitive data such as personal information or intellectual property.
In addition, organizations need to be vigilant about using MFA and strong passwords. Networks have been compromised because hackers guessed users passwords, which suggests a need for policies that require more complex passwords or the use of MFA.
Users can be careless when it comes to cybersecurity practices, so providing good training programs and running awareness campaigns are also good ideas to educate everyone in the organization. These programs should cover signs to look for that indicate phishing and other attacks as well as social engineering techniques frequently used by bad actors to gain sensitive information or network access.
By deploying azero-trust modeland taking care of the cybersecurity basics, organizations can put themselves in a position to defend against the latest threats, including ransomware.
Security today requires more than simply managing identities and authenticating users. It needs to assume that anyone or anything trying to get into the network is an intruder until proven otherwise.
Its a perfect confluence of events forzero trust to take center stagein the world of cyber security: the rise of hybrid and remote work, the ongoing shift to cloud services, the continuing growth of mobile devices in the workplace, and an onslaught of sophisticated attacks that can impact entire supply chains.
Never have organizations faced so many challenges in protecting their data resources and never have they needed to be more suspicious of users and devices trying to access their networks. The zero-trust model, with its principal concept that users, devices, applications, and even networks should not be trusted by default, even if they are connected to a verified network and even if they were previously verified, is well suited to todays typical IT environment.
There is simply too much risk that an outside entity trying to gain access actually has nefarious intent. There is too much at stake to trust anyone or anything. One of the more notable effects of the shift to zero trust is the realization that traditional virtual private networks (VPNs) are no longer fully capable of securing remote access to corporate networks.
The distributed workforce at an organization might have access to highly regulated customer data through on-premises or cloud-based customer relationship management and enterprise resource planning systems. They might also need to access commercially sensitive intellectual propertyall of this from personal devices.
Organizations need an effective way to secure and authenticate these users, and unfortunately, traditional VPNs have struggled to keep up with the traffic workloads that work-from-home generates.
Research by Tanium has found that overtaxed VPNswere the second biggest security challenge for organizations transitioning to a distributed workforce. The problems with legacy VPNs have not only imperiled the security of traffic flows, they are also contributing to a growing risk of security threats related to endpoints.
When the pandemic hit and organizations were forced to allow many employees to work from home, they relied on VPNs to support their distributed workforces, but with less than stellar results. While VPNs are familiar to many users and already in use for remote access, they are not the ideal tools to provide secure access for so many users relying on devices that in many cases are not as secure as they should be.
VPNs will not provide adequate defense against threats aimed at the home networks many users rely on when working remotely. In addition, the sheer number of VPNs a company might need to support an enormous mobile or hybrid workforce means the management and maintenance burdens could be overwhelming.
To truly provide secure access for a large number of remote workers, organizations need to think beyond VPNs and fully adopt the zero-trust model of cybersecurity.
With a zero-trust strategy and tools, its easier for security teams to provide secure access to applications, because they have more granular access controls and users do not get blanket permissions. Access rights are very specific and require continuous verification.
Device validation also makes up a key tenet of a successful zero trust strategy, and with remote work making up a large portion of end-user access today device posture is extremely important. Devices in many cases are the new perimeter within organizations, and device validation enables organizations to protect against stolen credentials or even stolen devices that cybercriminals can use to gain access to networks.
This is why practicing strong endpoint management is such an important part of a zero-trust approach. Without real-time and accurate endpoint management, organizations cant enforce compliance or validate device posture as a prerequisite for access. Authentication alone cant ensure that a device is secured.
The right tools can allow security teams to continuously check device posture against policies, to ensure that the zero-trust approach really does trust no one, even after identity and access policies are in place. Ideally, organizations should be able to integrate new zero-trust solutions with the tools they already use, so they dont have to start from scratch.
The concept of zero trust might come across as negativeeven paranoid: Dont trust anything, whether its devices and other endpoints, applications, networks or individuals. But what the model really indicates is that organizations are operating in uniquely challenging times, and much is at stake when a data breach or ransomware attack occurs.
More people are working remotely, in many cases using their own devices and networks. Companies are relying on cloud services more than ever. Attacks have become more sophisticated and canimpact entire supply chains.
Organizations need to take the initiative to ensure that valuable data resources are always protected and to be certain that the users and devices trying to access their networks will not do harm. Implementing azero-trust strategyis a truly effective way to achieve this level of security.
Learn how to migrate to a zero-trust architecture with real-time visibility and control of your endpointshere.
Visit link:
The New Cybersecurity Motto: Trust is Not an Option - CIO
Almost half of Canadians are worried about being a victim of cybercrime in the coming year: New RBC Cyber Security Poll – Canada NewsWire
Older Canadians (55+) are much more likely to be concerned about cyber threats and take basic precautions to protect themselves
TORONTO, Sept. 27, 2022 /CNW/ - A new poll on cyber security from RBC shows that while most Canadians (71 per cent) are knowledgeable about various types of cyber threats to their personal information, nearly half of Canadians (47 per cent) are worried that they will be a victim of cybercrime in the coming year.
"As Canadians live more of their life online, cybercrime has also grown year over year and become more sophisticated," says Adam Evans, Chief Information Security Officer, RBC. "The poll reveals that despite a high level of concern, most Canadians have not yet taken steps to protect themselves and might struggle to recover from a cyber-attack."
Cyber criminals have become more sophisticated and continuously evolve. While most people are aware of better-known cyber threats such as malware (60 per cent), phishing (56 per cent) and ransomware (47 per cent) there is lower awareness of newer threats. Only (30 per cent) were aware of pharming and vishing (28 per cent) giving these activities the potential to do more harm.
Pharming is the practice of redirecting internet users to a fake website in order to steal personal credentials. With vishing, criminals call or leave voicemails claiming to be representatives of a reputable company in an attempt to gain banking or other credentials.
Preparing for a cyber-attack
Across all age groups, two thirds (65 per cent) agree they need to develop a personal recovery plan. Yet despite their concerns, just 8 per cent have cyber protection through an insurance policy.
The poll also revealed that older Canadians aged 55+ are much more likely to be concerned about cyber threats and are especially concerned about unauthorized access to online accounts or personal information (83 per cent), having their email or social media account hacked (76 per cent), or being a victim of online fraud and scam (76 per cent).
Overall, the poll revealed that the top concerns around cyber threats and security include:
Protecting against cybercrime
When it comes to simple steps to protect against cybercrime, the poll revealed that only half of Canadians use antivirus software (50 per cent) or have multi-factor authentication (49 per cent) as security measures. Just over two in five change their passwords periodically (46 per cent) or use a strong password generator (42 per cent).
Younger people in the 18-34 age group are significantly more likely than their older counterparts to say they are knowledgeable about most threats to their safety and security of their personal information. However, they are not more likely to take protective measures:
In comparison
Tips to protect yourself against online cyberattacks and increase your cyber security
About the RBC Study
These are the findings of an Ipsos poll conducted on behalf of RBC. The survey was conducted in English and French. A sample of 1,500 Canadians was surveyed online via the Ipsos I-Say panel from Aug 12th to Aug 17th, 2022.
About RBC
Royal Bank of Canada is a global financial institution with a purpose-driven, principles-led approach to delivering leading performance. Our success comes from the 92,000+ employees who leverage their imaginations and insights to bring our vision, values and strategy to life so we can help our clients thrive and communities prosper. As Canada's biggest bank and one of the largest in the world, based on market capitalization, we have a diversified business model with a focus on innovation and providing exceptional experiences to our 17 million clients in Canada, the U.S. and 27 other countries. Learn more at rbc.com.
We are proud to support a broad range of community initiatives through donations, community investments and employee volunteer activities. See how at rbc.com/community-social-impact.
SOURCE RBC
For further information: Kiara Famularo, Communications, RBC, [emailprotected], 647-272-4077
See the original post:
Almost half of Canadians are worried about being a victim of cybercrime in the coming year: New RBC Cyber Security Poll - Canada NewsWire
Solve ICS security issues with ICS and IT team convergence – TechTarget
Industrial control systems refer to a broad class of automation systems that include programmable logic controllers, safety instrumented systems, distributed control systems, human-machine interfaces and SCADA systems. These systems are vital to critical infrastructure because they control and monitor manufacturing and industrial processes -- without which societies, countries and economies would fail.
Historically, ICSes had a high degree of physical separation from IT infrastructure. Changes in business requirements and innovations in technology, however, are causing an organic convergence.
Although ICS environments were previously left isolated intentionally, they are now increasingly connecting to other networks. Seventy percent of ICS environments had an external connection in 2021, almost double from the previous year, according to research from cybersecurity company Dragos.
This convergence did not happen on purpose, but rather is due to a number of organic changes that came largely from the digitization of ICS environments.
Some common drivers leading to ICS and IT convergence are the following:
The convergence of IT and ICS environments offers benefits for the entire ICS ecosystem. It also introduces new security risks, however, many previously unknown to manufacturers and industrial processes. Gartner predicted that, by 2025, threat actors will weaponize ICS to harm or kill humans.
To better understand the situation, let's explore the top security concerns.
The connectivity of ICS and IT is giving rise to increasingly internet-facing systems, making them vulnerable to cyber attacks and breaches. Most ICS assets are now cloud-managed for logging, monitoring and dashboarding, which adds a layer of complexity.
Disruptions in ICS environments can have major downstream impact, including risk of fines and censure, which is another reason why these industries have a low tolerance for downtime -- and why ICS infrastructure is an attractive target for cybercriminals.
Interruptions can have major implications on the security, reliability and performance of ICSes. A cyber attack or data breach could halt production, which can have significant cost implications. In the worst case, it could also contravene safety and trigger catastrophic consequences, such as power grid blackouts, environmental damage, paralysis of economic activity and loss of life.
ICS devices use bespoke versions of OSes that limit the scope of patching, updating and installing protection mechanisms, such as antimalware controls. Patching and updating these devices sometimes require intervention from the manufacturer of the device, which can take time or require a remote connection. This can expose the device to unexpected and uncontrolled network traffic.
ICSes also operate around the clock and, therefore, cannot risk applying untested patches.
Some organizations even go to the extent of switching off their security due to the lack of compatibility with automation systems. Managing and monitoring ICS security is also a full-time job, and many organizations don't have enough staff to manage ICS cybersecurity.
ICS teams and security teams have different priorities; one is focused on performance and availability, while the other is focused on security. ICS assets were traditionally sealed systems with localized, analog methods used to manage, monitor and control their behaviors. Engineers could manage the ICS without the intervention of IT or the security team. This is no longer the case and can often create friction between teams.
A quick fix for securing ICS environments doesn't exist, but there are steps to take to control it.
Start with a detailed understanding of what assets and devices make up the environment, and prioritize them based on the associated risks. Both IT and ICS teams must join to ensure a safe, secure and converged environment. IT teams can benefit from ICS engineers' years of experience in designing, building and maintaining such environments, while ICS engineers can benefit from the IT team's cybersecurity expertise.
Collectively, teams must articulate threats in a language the business understands so stakeholders comprehend the gravity of the situation and perpetuate a change in security attitudes and processes.
This is not a one-off collaboration or a one-off exercise. ICS engineers and IT professionals must continue to collaborate to keep a watchful eye on evolving risks and stay ahead of threat actors.
About the authorSteve Durbin is chief executive of the Information Security Forum (ISF), a not-for-profit association dedicated to investigating, clarifying and resolving key issues in information security and risk management by developing best practice methodologies, processes and solutions that meet the business needs of its members. ISF membership comprises the Fortune 500 and Forbes 2000.
Continue reading here:
Solve ICS security issues with ICS and IT team convergence - TechTarget
Secure and Trusted Honeygain the Only Passive Income App to Pass Antivirus Checks – GlobeNewswire
LONDON, Sept. 28, 2022 (GLOBE NEWSWIRE) -- Plenty of online money-making scams have perpetuated the notion that all technology is evil. Until Honeygain, the world's first crowdsourced web intelligence network, proved it is not always the case. The free Internet-sharing passive income application received zero flaggings from numerous antivirus software for malicious activities, making Honeygain the only secure application among its competitors.
After initiating an internal audit, the company performed an in-depth analysis of detectability by antivirus programs. Hence, Honeygain resolved any arising issues and was whitelisted by major antivirus software companies. Currently, the company is distributing the newest version of their installer which passes all of the antivirus scans.
Honeygain provides its users with a trusted service that lets them earn money passively by sharing their Internet connection. Honeygain has adopted such security measures as bandwidth encryption, 2-step factor authentication for payouts, andstrict KYC standards for its operations that help to ensure the traffic is only routed via their user's devices by trusted and reputable partners. Therefore,Honeygain is the only Internet-sharing application in the market, having no risk factors identified by various antivirus programs.
In accordance with the good practices of the most popular antivirus software like Kaspersky, Avast, Microsoft, McAfee, and many more, Honeygain ensured the safe usage of the application for its users by safeguarding them against potential risks. The application was tested to allow the exclusive execution of trusted files and block both known and unknown threats.Thus, Honeygain maintains its technological security policy and disallows accidental security issues.
It is a massive step for the company to be approved in this area as Internet-sharing applications are still a trailblazing development among technology enthusiasts. Nevertheless, the interest in such applications is rising annually, and millions of users are joining these platforms.
Along with the additional security measures to protect the users against malicious files, Honeygain never asks permission to access devices or any private data and encourages its potential users to use the official download links. Honeygain's Support team is dedicated to answering any users' questions in this regard and educates the users about the importance of staying safe online.
The supplied Internet connection powers Honeygain's crowdsourced web intelligence network. It helps businesses improve operations as the bandwidth is used to collect and analyze online data and perform price comparisons, ad verification, and marketing checks.
Contacts
Company Name: Honeygain
Contact Person: Ellen Lamite
Email:press@honeygain.com
Website:www.honeygain.com
Contact Information: Monica Durand PR Manager monica.durand@honeygain.com +37067972145
Related Images
Image 1: Honeygain
Honeygain Logo
This content was issued through the press release distribution service at Newswire.com.
Read the original post:
Secure and Trusted Honeygain the Only Passive Income App to Pass Antivirus Checks - GlobeNewswire