Sunday, January 24, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Data security lapses in Singapore’s public system underscore need for transparency

April 9, 2019
in Internet Security
Data security lapses in Singapore’s public system underscore need for transparency
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Tom Kellermann, Carbon Black’s chief cybersecurity officer, believes tools that provide visibility can help companies better detect threats. He pointed to the ability to see, for instance, when an employee has inserted a USB device into a workstation and attempts to download information. 

“Beyond technology, humans are often the weakest link in any organisation’s security posture,” Kellermann said. “Combatting rogue insiders can be thwarted by taking inventory of key data and limiting access to only trusted and authorised parties within the company.”

You might also like

MrbMiner crypto-mining operation linked to Iranian software firm

Hacker leaks data of millions of Teespring users

SEC calls out dubious cryptocurrency traders, miners soliciting customers worldwide

While the human factor can never be completely eradicated — as employees with authorised access can become disgruntled — prophylactic measures should still be implemented to reduce the risks, according to Stas Protassov, Acronis’ co-founder and president. For example, Protassov said, companies should regularly remind employees of punitive consequences should security breaches occur, which would urge users to be more alert and diligent. 

Commenting on what should have been implemented to prevent the HIV data leak, Kellermann said sensitive data should have been “completely locked down and encrypted”. “While there’s no silver bullet to stopping an insider attack like this, limiting access and the attack surface can make it much harder for a nefarious insider to cause damage,” he said. 

Kellermann noted that healthcare data was a highly coveted target for cybercriminals and, if stolen, could yield these hackers returns that are four times higher than financial data in black markets. 

Healthcare providers also often lagged behind other industries with regards to cybersecurity, which further exacerbated the problem, he added. “The data is lucrative and the resistance path for attackers is typically not very strong. With credential and login theft, as seen in the case of the SingHealth attack, hackers of all proficiency levels could be responsible,” he said. 

He underscored the need for organisations such as the Singapore Health Promotion Board to establish a clear view of activities across their enterprise environment, so attacks could be quickly remediated if they escalated. 

Protassov noted that the healthcare sector needed to significantly improve the monitoring of access to patient data by doctors and other parties, adding that there were tools to monitor unauthorised replication of such data. Behavioural analytics also could be implemented to identify any behaviour that was out of the ordinary, he said. 

“[And] while no external devices should be allowed [to connect to] systems containing sensitive data, all the data used for statistical or analytical purposes can and should be securely anonymised,” he noted. If this had been implemented in the case involving the HIV data registry, patients would have been unharmed even if there was a leak, he said.

He added that the health ministry’s move, following the incident, to bar external storage devices and unauthorised data copies, was generally correct.  

Asked what the general public should do to protect their personal data when dealing with the public sector, Protassov urged citizens to be mindful that they owned a significant amount of sensitive data, which–if stolen–could be used to damage their livelihood. This also should heighten the need for the public sector–specifically, healthcare–to adopt better security measures. 

“And learn [about] your country’s existing data protection laws and stay alert,” he said. “Nowadays, if you share your personal details with any public structure, you lose total control over it, but there are legal [recourse] you can take to keep your data from going into the wrong hands.”

RELATED COVERAGE

19-year-old makes millions from ethical hacking

The Argentine teenager has topped the charts when it comes to bug bounty hunting.

Singapore to offer bug bounty, set up Asean cybersecurity centre

Singapore government will launch a bug bounty initiative by end-2018, when local and international hackers will be invited to test systems for vulnerabilities, as well as a cybersecurity hub next year to facilitate collaboration and training efforts amongst Asean country members.

Singapore arms up on cyberdefence experts, opens cyberdefence school

Country’s defence ministry plans to hire 300 specialists trained in areas such as network monitoring and vulnerability assessment to better safeguard its systems and has opened a school to arm future recruits with cyberdefence skillsets.

Singapore defence ministry invites hackers to breach its systems

Country’s Ministry of Defence will run a “bug bounty” programme, led by HackerOne, inviting hackers worldwide to identify vulnerabilities in its internet-facing systems.

EU to fund bug bounty programs for 14 open source projects starting January 2019

Some of the approved projects include KeePass, 7-zip, VLC Media Player, Drupal, and FileZilla.

Credit: Source link

Previous Post

The Fourth Way to Practice Data Science – Purpose Built Analytic Modules

Next Post

How to Optimize Website Page Titles for SEO

Related Posts

MrbMiner crypto-mining operation linked to Iranian software firm
Internet Security

MrbMiner crypto-mining operation linked to Iranian software firm

January 24, 2021
Hacker leaks data of millions of Teespring users
Internet Security

Hacker leaks data of millions of Teespring users

January 24, 2021
SEC calls out dubious cryptocurrency traders, miners soliciting customers worldwide
Internet Security

SEC calls out dubious cryptocurrency traders, miners soliciting customers worldwide

January 24, 2021
Rogue CCTV technician spied on hundreds of customers during intimate moments
Internet Security

Rogue CCTV technician spied on hundreds of customers during intimate moments

January 24, 2021
SonicWall says it was hacked using zero-days in its own products
Internet Security

SonicWall says it was hacked using zero-days in its own products

January 23, 2021
Next Post
How to Optimize Website Page Titles for SEO

How to Optimize Website Page Titles for SEO

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

MrbMiner crypto-mining operation linked to Iranian software firm
Internet Security

MrbMiner crypto-mining operation linked to Iranian software firm

January 24, 2021
AI and its Importance in Financial Crime Investigation
Data Science

AI and its Importance in Financial Crime Investigation

January 24, 2021
Global Machine Learning as a Service Market (2020-2026) | Latest COVID19 Impact Analysis | Know About Brand Players: Amazon, Oracle, IBM, Microsoftn, Google, etc.
Machine Learning

Machine Learning in Education Market 2020-2026 | Comprehensive Study COVID19 Impact Analysis | Worldwide Key Players: IBM, Microsoft, Google, AWS, Cognizant, etc.

January 24, 2021
Hacker leaks data of millions of Teespring users
Internet Security

Hacker leaks data of millions of Teespring users

January 24, 2021
AI: The Horsepower of the Future
Data Science

AI: The Horsepower of the Future

January 24, 2021
Global Machine Learning as a Service Market (2020-2026) | Latest COVID19 Impact Analysis | Know About Brand Players: Amazon, Oracle, IBM, Microsoftn, Google, etc.
Machine Learning

Global Machine Learning Market (2020-2026) | Latest COVID19 Impact Analysis | Know About Brand Players: International Business Machines Corporation, Microsoft Corporation, SAP SE, Sas Institute Inc., Amazon Web Services, etc.

January 24, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • MrbMiner crypto-mining operation linked to Iranian software firm January 24, 2021
  • AI and its Importance in Financial Crime Investigation January 24, 2021
  • Machine Learning in Education Market 2020-2026 | Comprehensive Study COVID19 Impact Analysis | Worldwide Key Players: IBM, Microsoft, Google, AWS, Cognizant, etc. January 24, 2021
  • Hacker leaks data of millions of Teespring users January 24, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates