Privacy, vulnerabilities in open source code, and looking beyond COVID-19 headline this week’s Identity and Cybersecurity news digest.
Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. Every 2 weeks, we curate a selection of IGA, Healthcare, Identity and Cybersecurity articles. Check out our resources section for webinars, case studies, infographics, and educational videos.
Identity and Cybersecurity Articles
Data Breaches Hurt Small Businesses, Too! via Idenhaus
After a breach, almost 25% of SMB-sized companies file for bankruptcy protection, and another 10% completely go out of business. A decision to make any investment that reduces the likelihood of a breach actually improves the viability of the enterprise, making it a strategic decision by definition.
How To Control Costs And Risks As Data Subject Access Requests Increase via Information Security Buzz
If data subject access requests (DSARs) aren’t already putting significant pressure on your organization, they probably will be soon, for three key reasons.
An independent investigation of worldwide COVID-19 mobile apps found that several widely-used apps pose privacy risks to worldwide users.
70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs via ThreatPost
A full 70% of applications being used today have at least one security flaw stemming from the use of an open-source library. A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.
Remote Working and Geography Reveal Gulfs in Safe Data Practices via CPO Magazine
A new report published by email security firm Tessian reveals that nearly half of employees are less likely to follow safe data practices when working from home, and that US workers tend to more nonchalant about their data security than their counterparts in the UK.
Web Browsers still allow drive-by-downloads in 2020 via BleepingComputer
Numerous browsers still allow drive-by-downloads from what is meant to be secure contexts such as sandboxed iframes. For those unfamiliar with the term, a drive-by-download is when a user visits a site, and a file download is initiated without the user’s interaction.
Local, State Governments Face Cybersecurity Crisis via DarkReading
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.
The Windows 7 Postmortem: What’s at Stake via ThreatPost
Nearly a quarter of endpoints still run Windows 7, even though support and security patches have ended.
Why abandoned domain names are so dangerous via CSO Online
Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.
VPN Concerns with Unplanned Remote Employees via ThreatPost
Maintaining visibility and availability when you suddenly have a large remote footprint takes planning.
Healthcare-Focused Cybersecurity Articles
This is a prime opportunity for the CIO to step up and shine since IT departments often have one of the biggest budgets.CIOs will need to lead by example in several ways.
The Telehealth Opportunity in and Beyond the COVID-19 Pandemic via HealthPopuli
Through and after the pandemic, telehealth will continue gains respect and acceptance as an integral “front-door” for patient health care. Telehealth will blur into the health/care ecosystem and become part of patients’ experience the way we saw “e-business” blend into “just” doing business.
COVID-19 arguably represents the best opportunity for UN member states to cooperate in line with the agreed cyber norms, to build confidence and capacity among states, and strengthen adherence to these obligations to combat a common foe.
Crafting Successful Business Associate Agreements, Breach Response via HealthIT Security
The healthcare sector relies heavily upon its relationships with third-party vendors and business associates, which are critical to ensuring uninterrupted patient care. However, given the vast number of these relationships, providers can also inadvertently expand their threat landscape and create potential issues with HIPAA compliance, especially in the event of a breach.
Certain areas of digital health investment are having a moment right now, especially in telemedicine, as doctor visits went virtual while everyone sheltered in place during the COVID-19 pandemic.
Why an IAM Assessment is the Secret to Success via Idenhaus
The first step towards a successful IAM implementation is a comprehensive Identity Management Assessment to identify any issues with the solution architecture, business processes, data quality, and core requirements. Here are 7 key areas to consider when assessing an Identity & Access Management program.
Check out our previous digest IAM and cybersecurity articles, 9 Insightful IAM and Cyber Security Articles, May 2020
To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us