News &
Information

Ask Jack: Is AI A Threat. . . Now?

For months, experts have predicted that artificial intelligence (AI) will change the cyber defense landscape. Jack details a report that states it is now here.

Data Compliance Audit: A Double-Edge Sword When Defending Data Security Claims

A new report claims a surge in ransomware attacks. Compliance audits are necessary to limit risk, but there is a dark side to audits if organizations are not ready to comply.

"Juice Jacking" Alert: FBI Warns Of Bad Public Charging Ports

In an unusual move, the FBI warns the general public to stay clear of public USB charging ports. We explain why "juice jacking" is a threat.

Biometric Authentication: Still Not Ready For Prime Time

A bank's choice to rely solely on biometric authentication was quickly shown to be a risk. We explain.

Data Compliance Audit: A Double-Edge Sword When Defending Data Security Claims

The Thales Data Threat Report of 2024 highlights a 27 percent surge in ransomware attacks, with eight percent of affected companies paying the ransom.

Data breaches were tied to 43 percent of enterprises failing compliance audits, mainly due to human error. Human error continues to be the leading cause of data breaches for enterprises.

Malware was identified as the fastest-growing threat, affecting 41 percent of enterprises surveyed. Cloud assets, such as SaaS applications and cloud-based storage, are prime targets for cyberattacks.

Global cybercrime is projected to reach $10 trillion annually by 2025, according to the report. https://www.globaldata.com/newsletter/details/ransomware-surges-as-compliance-falters-thales-group_350223/

Commentary

The report notes the importance of compliance and that it is crucial for data security, as compliant companies are less likely to experience security breaches.

A common mechanism for determining compliance is a security compliance audit; however, a compliance audit is a two-edge sword. One edge spotlights your system's vulnerabilities which is always helpful so you can address where your system is weak.

The other edge is if you do not address your system's vulnerabilities, then the audit is the framework for litigation and regulatory action post-breach. 

The failure to address an uncovered vulnerability thoroughly and within a reasonable period of time will be considered evidence that data security was neglected, even if a known vulnerability was not the cause of a breach.

The takeaway is that compliance audits are crucial and that organizations should perform audits regularly, but organizations must also make available the resources, finances, and personnel to meet any discovered deficits discovered in an audit in a timely manner. Importantly, organizations must document and maintain records of their compliance efforts.



 

 

Finally, your opinion is important to us. Please complete the opinion survey: