What have we learned from this or similar cybersecurity data breaches? And how much impact can a data breach cost an enterprise? According to the Ponemon Institute Study, the cost of a data breach varies by industry and the average per capita cost was $221 in the US with average total organizational cost at $7.01 million. The more records that are lost forces the departure of customers. In addition, the post data breach response costs go higher including helpdesk activities, communications, investigation, remediation, legal expenditures along with pressure from regulatory body interventions to review the cybersecurity preparedness and identify the gaps that resulted into the successfully data breach.
In future, IT departments will need to employ people with a wider range of skills, opening up new opportunities for women, Kris van Riper, practice leader at CEB told Computer Weekly. “There will be more people in the IT team with marketing background, maybe digital marketers; more people with customer experience background; more people who are business analysts, who are getting requirements from customers; and project managers,” she said. The trend follows a shift in the role of the IT department from a department that drives IT projects for business, to a department that acts as an advisor for other parts of the business that want to adopt digital technology. Research shows that companies with a more equal balance between male and female employees, particularly at senior levels, are more successful than those that are more male dominated.
Cloud is a way of doing IT. Again, a little pattern recognition. If you go back to the mid 1990s where people were talking about the Internet, the questions were: What's your Internet strategy? Where's is your Internet product division? Where's your vice president of the Internet? Where is all that now? Well, it turns out that the Internet is everywhere. It's in everything, that's just how we do stuff. We get it, it's like oxygen. The cloud is actually like that, too. And this is why it's a bit of a confounding topic, because cloud is not just a place, it's a way of doing things. Within our family, of course, we have VMware, which has 500,000 customers who are all on this journey to some form of a private cloud, a hybrid cloud, a multi-cloud world where they're connecting all these things together.
The IoT devices are being used to mount attacks “against a multitude of internet targets and internet-facing services, such as HTTP, SMTP and network scanning,” as well as to mount attacks against internal networks that host the devices. In many cases, there are default login settings such as “admin” and “admin” or other lax credentials to get to the web management console. Once attackers access the web admin console, they can compromise the device’s data and sometimes even take complete control of the machine. The attack itself is not new, but Akamai Technologies has seen a surge in SSHowDowN Proxy attacks in which IoT devices are being “actively exploited in mass scale attack campaigns.”
Organizations have begun to acknowledge the importance of detecting and preventing insider threats. Just as it is vital to have methods to detect external threats, it’s also important to protect your organizations assets and systems from unauthorized insider misuse or destruction. Physical security networks and IT infrastructures have been running as separate networks in years past. Since video monitoring systems and access control systems started using the TCP/IP open network, however, IT is being applied to the realm of physical security more often. Access control, such as card and biometric recognition, along with visitor management programs, all use an IT platform. Similarly, video management technologies (cameras, thermal observation units) gunshot detection, and intrusion alarms use related IT systems.
With so many IoT devices, apps, and services coming to market, more and more personal info is being captured, transmitted, and stored, yet much of this data is unnecessary to support the functionality of the device or service. You may think this is not a big deal, but the more personal data you have, the more resources your company will have to devote to protecting it. If there is a breach, the bad guys can extract a large amount of personal information about customers. The potential consequences range from identity theft and fraud of your customers to significant financial damage to your company’s brand. Once a month I get an email from my thermostat service, telling me how I compared to the previous month, to my neighborhood, and what external factors may have caused my energy use to change.
In Madison, Wisconsin, insurer American Family has a 600-square-foot model home, complete with furniture, where it is testing out water sensors, cameras, and other devices. The company already offers a discount for customers who install the Ring video doorbell, because it acts as a deterrent to burglary. Sarah Petit, a director of business development, says that the company wants to expand the number of smart home devices it supports. So far, insurers’ dreams of rewiring how we look after our homes have been hampered by questions about privacy and security, as well as by incompatibilities between smart devices from different companies. Petit says the head of the Illinois Department of Insurance recently told her of concerns that data collected from consumers’ homes could be misused. And defining what counts as misuse can be difficult.
While we’re starting with HI+AI in health diagnosis, transportation coordination, art and music, our partnership is rapidly extending into co-creation of technology, governance and relationships, and everywhere else our HI+AI imagination takes us. .... Our connection with our new creations of intelligence is limited by screens, keyboards, gestural interfaces and voice commands constrained input/output modalities. We have very little access to our own brains, limiting our ability to co-evolve with silicon-based machines in powerful ways. Relative to the ease and speed with which we can make progress on the development of AI, HI, speaking solely of our native biological abilities, is currently a landlocked island of intelligence potential. Unlocking the untapped capabilities of the human brain, and connecting them to these new capabilities, is the greatest challenge and opportunity today.
The new role requires is a far more white-glove approach that provides personal attention. Lillie is "mapping" the journey for Equinix’ 8,000-plus customers, recommending appropriate services and modifying processes or IT systems to satisfy customers' business needs. If a customer recommends changes to a product, Lillie loops in Baack. "I make sure that that voice of the customer gets to Sara for inclusion in the product roadmap," Lillie says. Lillie says he anticipates facing challenges such as when an Equinix business line and its customer are at odds over product functionality. “I’m going to have to get them to see that that’s not how the customer sees it,” Lillie says. Forrester Research analyst Sharyn Leaver says the practice of promoting CIOs to chief customer officers may accelerate in the tech industry, where it’s common for IT leadersto purchase products from dozens to hundreds of vendors.
After the pilot in Espoo, the buses will move to Tampere, central Finland, before the trials are put on hold for the winter months. The robot buses will return to the streets in the spring with the pilots continuing until 2018. The Finnish robot bus pilot comes as the race heats up to bring autonomous vehicles on the streets. ... The Finns see this wide interest in automated transportation as a major opportunity for the country. Traffic legislation in Finland is among the world's most permissive when it comes to testing autonomous vehicles, as a driver is not required to be inside the vehicle. Tommi Arola, ministerial adviser at the Finnish Ministry of Transport and Communications, says, unlike many countries, Finland's legislation doesn't define where a driver should be in a vehicle or require that their hands are on the wheel at all times.
Quote for the day:
"The lurking suspicion that something could be simplified is the world's richest source of rewarding challenges." -- Edsger W. Dijkstra