When Peter Drucker produced his seminal work, “What Makes an Effective Executive,” in the Harvard Business Review (Drucker, June, 2004), he may not have been writing with cybersecurity in mind. In fact, in 2004, the cybersecurity world had only begun to appear as the many-headed beast it’s become since then. Nonetheless, this text is an excellent guide for executives about incident response and breach management.
Cybersecurity is a Team Sport: Peter Drucker on Cyber Attacks
Topics: Cybersecurity, budgeting, security incident handling
Sophisticated Threat Actors are using LinkedIn to Phish Employees
Phishing via employment-focused social media is on the rise. While performing incident response over the last few months, ProCircular encountered multiple incidents where LinkedIn was used in employee phishing attacks. Several news articles raised awareness of this phishing vector over the last year, and the trend continues with a new wave of attacks by sophisticated threat actors.
Topics: Incident Rsponse, hacking, risk
Topics: Information Security, Incident Rsponse, security incident handling, security incident response, DEF CON
5 Steps to Creating a Cybersecurity Incident Response Plan
Incident Response (IR) is the way your team reacts to an occasion of data insecurity. A cybersecurity incident is an event that threatens your operation's data or systems. Incidents might include malware infections, data breaches, unauthorized access, or any activities that compromise your computer systems' or networks' security.
Technology is essential to modern business operations, but cybersecurity risks and data exposure threats come with that. Thankfully, a virtual chief information security officer (vCISO) can bring comprehensive strategic and operational leadership to security for companies that can only afford a part-time person in an executive cybersecurity role. Amid today’s industry-wide shortage of skilled security workers, vCISO could be the best option for finding and retaining critical security leadership.
Topics: Cybersecurity, vCISO