Friday, April 23, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Employee safety is for sale

December 28, 2019
in Internet Security
Employee safety is for sale
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

10 of the biggest cybersecurity disasters and hacks in 2019
ZDNet’s Beth Mauder looks back on 2019 and the worst incidents that happened in cybersecurity. Read more: https://zd.net/2r6yvfT

In Forrester’s “Predictions 2020: Cybersecurity” report, we projected that the anti-surveillance economy would grow by 15%. At the time, we didn’t know a story about location data would publish a few weeks after our prediction, but we knew that the conditions existed for something like this to occur. Surveillance is now an enterprise risk. Specifically, The New York Times shares how its reporters were able to obtain the location data of specific individuals from the data set. For security leaders, those individuals could represent an executive, shareholder, employee, or contractor for your firm. 

You might also like

Best free PC antivirus software in 2021

ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation

SolarWinds hack analysis reveals 56% boost in command server footprint

Location data is vital to operational security 

Many companies use compartmentalized facilities and technology to isolate teams working on new mission-critical innovation. The projects have code names, special non-disclosure agreements, and strict third-party contracts to ensure that their secrets are kept safe. All those precautions can be rendered useless, however, because of data brokers’ ability to provide competitive insights about your firm based on location data. For example, say a competitor identifies that your executives have meetings with several early-stage startups in a niche category — they could now identify which companies you might be targeting for acquisition based on where your employees are traveling to. Those competitors could determine that you are meeting with a supplier that makes a specific type of technology, which could clue them in that you are developing a new piece of hardware with specific functionality. Back in the film “Wall Street,” this Bud Fox character followed around various individuals; now, he’d just have to buy data. Data can tell you whether “Blue Horseshoe loves Anacott Steel.” The surveillance economy – the dark side of the data economy – should vault into your risk register in 2020. 

IT and security are clueless to employees’ apps 

Anti-surveillance tools are usually first adopted by end-users that are looking to make their jobs easier. For example, many users run pop-up blockers or add-ons that prevent scripts from running on webpages. However, many of these tools are not supported by IT or security despite them being run on corporate devices. The bottom-up approach will not work for enterprises in the surveillance economy. IT and security need to stay on top of this. Mobile devices are also creating issues because they share enriched data about location on top of browser histories, cookies, and IP addresses. 

BYOD is not new, but new problems exist 

The balance between allowing enterprise data on a mobile device, personal use, and personal ownership of that device is still a balancing act. But as more details on the amount of location data available and the degree to which that data can tie to specific individuals emerge, more complications are added to bring-your-own-device. CISOs need to protect non-corporate-owned devices. Physical security is also a concern, especially as location data intersects with geopolitics and especially when executives or employees with critical knowledge of company initiatives travel abroad to countries where kidnapping or other physical security threats could occur. 

Protecting the privacy of your employees helps you secure the enterprise 

In 2020, we will continue our anti-surveillance research into the tools, techniques, and procedures that security leaders must adopt in order to protect the privacy and security of their employees. In much the same way that companies now offer their employees identity protection as a benefit or discounted subscriptions to enterprise productivity software, they will need to offer the same to help protect online anonymity and prevent technology-enabled surveillance on their employees. CISOs who do a good job on awareness, behavior, and culture will recognize that savvy users will not only appreciate this but come to expect it in the future. Those that do neither will open their firms to data gathering by competitors and investors at best or attackers with malicious intent at worst. 

To learn more predictions from Forrester’s cybersecurity team, download Forrester’s Predictions 2020 guide to understanding the major dynamics that will impact firms next year. 

This post was written by VP, Principal Analyst Jeff Pollard and Fatemeh Khatibloo, and Principal Analyst Heidi Shey. It originally appeared here. 

Credit: Zdnet

Previous Post

Software Engineers Just Want to Keep Learning: Study

Next Post

Responsible And Ethical AI — Building Explainable Models

Related Posts

Best free PC antivirus software in 2021
Internet Security

Best free PC antivirus software in 2021

April 23, 2021
ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation
Internet Security

ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation

April 23, 2021
SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
New US Justice Department team aims to disrupt ransomware operations
Internet Security

New US Justice Department team aims to disrupt ransomware operations

April 22, 2021
Facebook uncovers Palestinian government officials targeted with malware
Internet Security

Facebook uncovers Palestinian government officials targeted with malware

April 22, 2021
Next Post
Responsible And Ethical AI — Building Explainable Models

Responsible And Ethical AI — Building Explainable Models

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Evolving ITOps with AIOps with no-code AI training with Cloud Pak for Watson AIOps – IBM Developer
Technology Companies

Evolving ITOps with AIOps with no-code AI training with Cloud Pak for Watson AIOps – IBM Developer

April 23, 2021
Best free PC antivirus software in 2021
Internet Security

Best free PC antivirus software in 2021

April 23, 2021
Cybercriminals Using Telegram Messenger to Control ToxicEye Malware
Internet Privacy

Cybercriminals Using Telegram Messenger to Control ToxicEye Malware

April 23, 2021
Strategies for a successful Voice of the Customer program
Data Science

Strategies for a successful Voice of the Customer program

April 23, 2021
European Values Confront AI Innovation in EU’s Proposed AI Act  
Artificial Intelligence

European Values Confront AI Innovation in EU’s Proposed AI Act  

April 23, 2021
Artificial Intelligence and Machine Learning: Demographics & Firmographics
Machine Learning

Global Federated Learning Solutions Market (2020 to 2028)

April 23, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Evolving ITOps with AIOps with no-code AI training with Cloud Pak for Watson AIOps – IBM Developer April 23, 2021
  • Best free PC antivirus software in 2021 April 23, 2021
  • Cybercriminals Using Telegram Messenger to Control ToxicEye Malware April 23, 2021
  • Strategies for a successful Voice of the Customer program April 23, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates