Errores comunes o riesgo de una violación de datos

Errores comunes o riesgo de una violación de datos

The first step in fixing any IAM problem is to understand it. basically Common mistakes or risk of a data breach.

IAM is the information technology security framework of policies that ensures the right users have the appropriate access to the resources they need to do their jobs well. basically It requires managing the lifecycle and roadmap of your users’ identities, governing their access, and properly monitoring the use of their identities and credentials through identity analytics.

Effective IAM ensures that adequate controls are in place to control the ability of users to interact with critical systems, for which they require «privileged» access basically the basis of Privileged Access Management (PAM).

But this isn’t the only way threat actors find security gaps, which is why businesses must avoid the most common identity and access management (IAM) mistakes.

The most common IAM mistakes:

  1. Poor or partial IAM implementations
  2. No clear IAM governance results
  3. No executive leadership team “buy-in” or clear guidance for employees.
  4. A lack of skilled cybersecurity experts as IAM engineers, architects, and managers.
  5. Multiple systems of record with duplicate identity credentials.
  6. Political infighting over data and application ownership or responsibility.
  7. A lack of organizational change management processes to resolve issues and stay ahead of hackers’ latest tactics.
  8. A fear of automation, causing a reliance on risky, time-consuming manual processes.
  9. Uncleaned data lifted and shifted into new IAM systems.
  10. Unrealistic IAM roll-out basically approaches that aren’t effective.

And above all, identity security should never rely on the CISO or CIO to manage and communicate. All business leaders must share the same strategic vision around IAM and drive it within the organization to succeed also including the CEO, CFO, and COO.

Common mistakes or risk of a data breach

Common mistakes or risk of a data breach

Don’t wait until it’s too late to fix the problems in your IAM strategy, and get ahead of the curve by fixing the easy mistakes you’re making today.

Shall we talk?

 

Sources:

(1) Spiceworks

(2) Computerweekly

Image: Kris in Pixabay

Amenazas automatizadas en el sector minorista

Amenazas automatizadas en el sector minorista

Automated Threats in the retail sector

retailers

According to the most recent studies, 62% of the threats that retail organizations faced were automated, and that suggests an increasing threat level that corporations need to be aware of.

Online retailers have seen a tenfold increase in the proportion of attacks carried out through frameworks designed to preserve anonymity. If last year the proportion was only 3.5%, this year it has shot up to 33% with all elements considered and taken into account.

In the past 12 months, nearly 40% of traffic hitting the average ecommerce website was not generated by humans, but instead came from often-malicious bots running automated tasks. Nearly a quarter of traffic – 23.7% – was attributable to advanced bots using cutting-edge evasion techniques to mimic human behaviour and avoid detection.

Last year, bot-related attacks grew by 10% during October and another 34% in November. Providing clear evidence that the actors behind such automated bot networks. Are keenly aware of the value of the holiday period to retailers. Indeed, one variety of automated bot has become known as a Grinch Bot. Scooping up inventory that is in high-demand and hoarding it, making it harder for legitimate consumers to purchase gifts online.

Other malicious bots

The attackers behind these bots are generally using leaked customer details in credential stuffing attacks. In an indication of the volume of their activity. Imperva found 22.6% of all login attempts on retail websites are malicious.

With limited staff and conflicting priorities, retailers face the challenge of combating security threats. Many retailers still delegate key security activities to auditors, contractors and stores. Finally, many retailers lack a governance process and focus instead. Regulatory compliance at the expense of a framework that governs information.

Shall we talk?

Sources:

  • Digitalinformationworld.com
  • Computerweekly.com
  • Businesswire.com
Transformar el riesgo en una ventaja estratégica

Transformar el riesgo en una ventaja estratégica

companies

Transforming risk into an advantage

The need for a conscious and holistic approach to governance, evidently risk and compliance (GRC) has never been more critical for organizations. As the business environment changes, companies need to evolve their GRC strategies to maintain a holistic view of interconnected risks, fourthly understand the financial implications of those risks and make more informed decisions at all levels.

How to take a proactive approach to transform risk into a strategic advantage:
  1. As your business prepares for inflation, economic uncertainty, and the global risk of stagflation, you must build resiliency to recover from obstacles with minimal business impact. despite Resiliency has gained importance in recent years. It integrates with enterprise-wide risk management and works across the organization, basically providing a comprehensive view of what’s at stake. Agility and resilience complement each other.
  2. Technology leaders, like CIOs, now at the center of corporate decisions, are becoming critical decision-makers in core business functions such as marketing, sales, product development, and finance.
  3. To build and maintain customer trust in third-party vendors, you need a proactive approach to third-party risk management. Amid escalating economic uncertainty, you need to look closely at third-party companies as businesses – which vendors are mission-critical and which ones you can eliminate with minimal negative impact. Most companies conduct some due diligence, but many don’t monitor third-party risks beyond an annual checklist. By then, information could be outdated, vendors noncompliant, and your business at risk. With the right tools and clear communication, your business can manage vendor risks to protect yourself and your customers.
  4. More than 80% of consumers believe companies should actively shape ESG guidelines, and almost all (91%) business leaders believe their organization is responsible for acting on ESG issues. Additionally, 86% of employees want to work for businesses that share their values.
  5. A resilient organization requires flexible and adaptable structures in all operational areas. While hybrid work offers employees flexibility, it also increases operational risk.

companies

Risk management is everyone’s responsibility. Cultivating a culture of resiliency and taking control of third-party relationships will improve your risk attitude.

Source:

  • Learn.g2.com
  • PwC
  • Logicgate.com
  • Worldbank
Código de Derecho de la Ciberseguridad

Código de Derecho de la Ciberseguridad

Cybersecurity Law Code

Cybersecurity Law Code

There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the Union. This Directive has a couple of articles related to the security of networks and information systems for essential service operators and digital service providers.

Article 14 states that «Member States shall ensure that operators of essential services shall take appropriate and proportionate technical and organizational measures to manage the risks to the security of the networks and information systems» used in their operations. Adequate and proportionate measures to manage the resulting risks to the security of the networks and information systems» used in their operations. Given the situation, these measures will guarantee a level of security of the networks and information systems that is adequate in relation to the risk posed.”

Likewise

The competent authority or the CSIRT (acronym for Computer Security Incident Response Teams) must also be notified without undue delay of incidents that will have significant effects on the continuity of essential services provided so that they can be taken. Institutional or national measures in this regard, where appropriate.

In addition, in June 2019 the EU Cybersecurity Regulation entered into force, and introduced:

  • A certification system for the whole EU,
  • A new and strengthened mandate for the EU Agency for Cybersecurity.

The EU has established a single EU-wide certification framework that builds trust. It increases the growth of the cybersecurity market and facilitates trade across the EU.

In Spain we have a Cybersecurity Law Code, published in the Official State Gazette. Ensuring the aforementioned cybersecurity.

Regarding cybersecurity

Cybersecurity Law Code

At a technical and organizational level it is necessary to take into account the new European Data Protection Regulation. Regulation (EU) 2016/679. As well as the existence of other types of international protocols or standards. Especially those related to the international transfer of data, such as the Privacy Shield.

These are just some of the rules that protect cyberspace. But there are many more detailed ones that regulate even more specific aspects.

Therefore, cybersecurity covers many subjects related to criminal and civil law, and the protection of honor or privacy, among others, that are also applied in the real and physical world. The resulting impact due to the fact of occurring in the digital world.

Also, on 15 September 2022 The European Commission published a proposal for a Cyber Resilience Act (the ‘Regulation’), which aims to:

  • improve transparency so that users can take cybersecurity into account when selecting and using a product with digital elements.

The Regulation will affect a wide range of parties in the technology supply chain. Here you will need to consider how the additional cybersecurity requirements will affect your manufacturing and distribution processes. Although most of the obligations will take effect 24 months after entry into force. Manufacturers will only have 12 months to comply with the Act’s reporting obligations.

Sources:

  • technologylawdispatch
  • enisa.europa.eu