Fuga de datos en redes sociales: un caso de robo cada vez mayor

Fuga de datos en redes sociales: un caso de robo cada vez mayor

Personal data leaks have occurred to both large and small businesses. In addition, it happens very frequently, more and more in recent years.

Most of them are a consequence of cyber-attacks on networks or e-commerce security breaches. Incidents such as these can devastate a company.

Why do social networks allow data leaks?

Social media platforms are a primary security weak point for businesses due to data leaks. Social media is quickly turning into a primary security weak point. A single data breach within one of the social media networks can result in millions of records being stolen.

Social media is one area where security teams have faced a steep learning curve. Beyond the fact that through LinkedIn, Facebook and Twitter employees can connect with each other, social networks have another attraction for companies.

For example, to take advantage of social media platforms as tools to carry out brand recognition, customer service, advertising and recruitment processes. Yet every user on every platform presents a social media risk to security professionals. And the risks are many.

One of the most affected sectors during the pandemic was the health sector. Know the key points of healthcare cybersecurity.

Top areas for attention

  • Account tracking
  • Conduct regular security and privacy reviews
  • Keep access up-to-date
  • Use a Virtual Private Network
  • Ensure adequate device protection
  • Monitor your social media channels
  • Employee training is crucial
  • Beware of third-party apps

At the same time as the rapid growth of technology occurred, social networks increased in popularity. The fundamental reason for this is the ability of networks to connect people.

Because it provided an ideal platform to connect with your friends, family and colleagues. Since it provided an ideal platform to connect with your friends, family and colleagues.

The information shared in social network spreads fast, almost instantaneously. For that reason, it attractive for attackers to gain information.

The secrecy and security of social media platforms must be consulted from various positions. There are many security and privacy issues related to shared user information. Especially when a user uploads personal content like photos, videos, and audios.

Finally, the attacker can maliciously use shared information for illegitimate purposes. See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world. Let’s talk?

Sources:
(1) techtarget.com
(2) https://link.springer.com/
(3) Forbes

Picture: Foto de redes sociales creado por rawpixel.com – www.freepik.es

Protección de la información, gestión de identidades y el control de accesos para B:SM

Protección de la información, gestión de identidades y el control de accesos para B:SM

Protección de la información y gestión de identidades

Estamos muy felices de contar participar en un ambicioso proyecto de gestión de identidades y accesos para Barcelona de Serveis Municipals (B:SM), un proyecto que les coloca en una posición de vanguardia en materia de seguridad, concretamente en los ámbitos de protección de la información y en la gestión de identidades y el control de accesos.

Protección de la informaciónBarcelona de Serveis Municipals (B:SM) es una empresa del Ayuntamiento de Barcelona encargada de la prestación de servicios municipales. Las actividades que gestiona incluyen aspectos relacionados con la movilidad, o la gestión de instalaciones dedicadas a la cultura, el ocio y la biodiversidad.

Se trata de una entidad que maneja un alto volumen de información sensible y necesitaba proteger de forma eficiente. Cumpliendo con la nueva RGPD (Reglamento General de Protección de Datos) y ENS (Esquema Nacional de Seguridad). De obligado cumplimiento por las administraciones y empresas públicas. Además, requería de una solución para la gestión de forma precisa y automatizada de todo lo relativo a la administración de los usuarios, desde la provisión o la sincronización hasta la coherencia de las identidades o los procesos de autenticación para evitar suplantaciones de identidad.

«B:SM needed a solution to delegate, manage, but automate and secure Active Directory (AD) and Active Directory Federation Services (ADFS) access among various administrator groups. In addition, to do so in a segmented manner, with change control, protecting sensitive or critical data, and ensuring that corporate policies are effectively enforced.»

La respuesta a estas necesidades en el ámbito de gestión de identidades y accesos la hemos ofrecido con Soffid.

SOLUCIÓN EN LA QUE NOS CENTRAMOS DESDE SOFFID

En marzo de 2020 se inició el despliegue on premise de Soffid, algo que les ha permitido desarrollar una gestión y orquestación centralizada de sus políticas de gestión de la identidad y de los accesos.

Con un máximo nivel de seguridad, Soffid propone una única herramienta convergente. Desde donde es posible llevar a cabo la gestión automatizada de usuarios y accesos en su Directorio Activo. Su servidor de correo Exchange. Que está en proceso de migración a Azure.— y en Office 365 como entorno de productividad. Además, se integra también con su sistema de gestión de RRHH: Meta4.

Protección de la información y gestión de identidades

Protección de la información y gestión de identidades

Se trata de un avance muy significativo con respecto a la situación de partida, en la que, tanto el alta de usuarios en Meta4 como la gestión de accesos. Se realizaba de manera semiautomática (en Directorio Activo y Exchange) o totalmente manual (en el caso de las aplicaciones). Ahora, Soffid permite realizar un alta automatizada en base a perfiles. De esta forma, cuando se crea un nuevo usuario se generan automáticamente los accesos a su cuenta de correo. Ee crea también su carpeta personal que está compartida en red de forma que puede ser accesible desde cualquier punto. Mediante la activación de una característica específica de Windows (Distributed File System o DFS). Este es un aspecto crucial en situaciones de movilidad y teletrabajo.

Gestión de los usuarios

Además, también se le otorgan los permisos de acceso a las aplicaciones correspondientes. De acuerdo con su perfil y con independencia de su dominio. Este último punto es importante para la gestión de los usuarios y accesos de los empleados de empresas participadas por B:SM como, por ejemplo; Parque de Atracciones del Tibidabo (PATSA).

Esta iniciativa, que alcanza a los 1200 empleados de B:SM, no solo ha simplificado y agilizado los procesos relacionados con la gestión de usuarios y accesos (altas, bajas y modificaciones), sino que también supone elevar a un nivel máximo las garantías de seguridad y de gobierno, puesto que todo queda registrado y auditado en Soffid.

EL PAPEL DEL EMPLEADO

One of the key aspects but of both projects has been to ensure the role of people, even in the pre-implementation phases.

These possible phases include developments such as the use of Soffid’s role-mining function. Based on the accesses that users also have in a given position. It creates an algorithm to define – automatically and intelligently – the permissions associated but with that specific role.

On the other hand, in order to gain agility and increase the level of user involvement in security. The implementation basically of a self-service portal is envisaged. This would allow them to self-manage also their passwords or incorporate a strong authentication system. Either via token, SMS, but etc. The use of Soffid as a single sign-on solution is also being evaluated. This would allow B:SM to extend but Microsoft’s federated authentication to other environments and applications.

In addition, you are also granted access permissions to the corresponding applications. According to their profile and regardless of their domain. This last point is important for the management of the users and accesses of the employees of companies in which B:SM participates, such as, for example, Tibidabo Amusement Park (PATSA).

Cómo exponer a la gerencia el valor de la seguridad de la información

Cómo exponer a la gerencia el valor de la seguridad de la información

Exposing management to the value of information security

Cyber security

Cyber security has always been an unsought goods like, insurance, which is useful only when something bad happens. And It’s always been challenging for security leaders to communicate the value of cybersecurity investments to board and peers. Furthermore, everyone in an organization has their own perspective when it comes to cyber security. That’s partly why security professionals find it difficult to convince management for budget approval.

The value of cybersecurity should be crystal clear to life sciences and health care boards and leadership. Cybersecurity attacks and data breaches seem to be in the headlines almost daily, and sobering statistics are everywhere.

Security leaders

Like data breaches, service disruptions and loss of customers. They need to justify security investment and acquire budget to protect organizations from the growing. List of threats that could impact the future of the business.

Then there’s the problem of speaking a different language. Over time it can be observed that cybersecurity metrics are often communicated in complex ways. Technical language that is difficult for the CEO or other business functions to understand. But translating cyber risk into business risk has never been more important. As many organizations face significant budget cuts amid COVID-19.

A comprehensive cybersecurity program is a business-critical function. With three tips, CIOs and CISOs can better communicate cybersecurity. additionally ROI by stressing why these programs are a must-have for their organizations. Demonstrating the business value of security solutions and building a strong security culture.

Cybersecurity should not be treated as a siloed department, but rather an integrated part of overall business functions. One way to communicate the far-reaching value of a cybersecurity strategy is to walk leadership through the consequences of a data breach — loss of customers, data, revenue, intellectual property and more — as these consequences directly affect a business’s bottom line. By connecting the dots for non-IT executives, they’ll be able to better acknowledge the importance of strong security practices.

Create a Positive Security Culture

Engaging the whole organization to help them understand the value of a cybersecurity program is not easy. Technical risks are often difficult to translate across departments. Meanwhile, policies and procedures that ensure good security habits can be seen as an impediment to employee productivity.

This is why a positive security culture is so important. By using techniques like gamification, positive reinforcement, or interactive content like videos and podcasts to promote security practices, CISOs can engage fellow employees and get more buy-in from executives. These strategies help everyone, regardless of department or level of seniority, understand the risks and responsibilities regarding security and how each employee plays a crucial role.

One major benefit of a positive security culture is that it creates in-house evangelists who can demonstrate the value of cybersecurity. It will also empower security-aware employees to become the organization’s greatest cybersecurity asset. Simple human error causes the majority of security breaches.

Ultimately, communicating the value of cybersecurity depends on translating cyber risk into business risk, and making security a guiding principle for your larger organization. With risks and challenges related to remote working becoming the new normal for many organizations, it’s critical that IT leaders engage all employees in shared cybersecurity awareness.

 

Situations are changing

Cyber securityas boards and management are understanding the importance of security. Now it’s the security leader’s responsibility to communicate the importance of cyber security effectively. This has become very important during the pandemic when huge risks of cyber breaches. Many things are coming and this is causing organizations to cut costs due to the business slowdown in order to survive the pandemic.

Communicating the value (and necessity) of cybersecurity measures to your larger organization isn’t easy. We know that not only are technical risks difficult to transfer across departments, but also that policies and procedures can often be seen as an obstacle to employee productivity.

But, if you can engage with the larger organization and create a positive security culture, you’ll have a better chance of getting buy-in from C-level executives. How?

More and more, CISOs are relying on gamification, positive reinforcement, and interactive content like videos and podcasts to promote their strategies.No matter what the method or medium, it is best that the risks and responsibilities – upon which the entire organization rests – are communicated in a way that everyone, regardless of department or level of seniority, can understand.

The benefits of this are two-fold. Not only will you demonstrate the value of cybersecurity via in-house evangelists, but you’ll also empower security-aware employees to become your biggest cybersecurity asset.

 

Resources:
(1) Gartner
(2) KPMG
(3) security Tech

Picture: <a href=’https://www.freepik.es/fotos/icono’>Foto de Icono creado por 8photo – www.freepik.es</a>