Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

BCS ITNow 201412 - Stay Alert

90 views

Published on

When it comes to dealing with security threats we need to be constantly vigilant says Gareth Niblett, Chairman of the BCS Information Security Specialist Group.

Published in: Internet
  • Be the first to comment

  • Be the first to like this

BCS ITNow 201412 - Stay Alert

  1. 1. Security and privacy seem to be in a constant battle with those that wish to undermine it. We are constantly being bombarded with dire warnings of the latest vulnerabilities and attacks that will bring our digital,and physical,world down around our ears.So who are we fighting,and what can we do about it? Crooks From hackers compromising millions of customer records and credit cards, through phishers picking off their victims one at a time, to scammers extorting malware infected users to unlock their data, the crooks have an upper hand. They only have to win a small number of times to make their efforts worthwhile. Companies need to work on the basis that they are under attack,and may already be infiltrated,ensuring that their defensive posture is appropriate. Users need to be educated and aware of the potential threats and understand the basics of good password hygiene,patch management and caution online. Spooks Intelligence agencies are tasked with protecting us from threats to national security, but they can undermine our liberties. We have seen instances over the years of unwarranted overreach and untargeted mass collection,which has meant that even lawyers,journalists and the public can be considered fair game. The phrase ‘if you have nothing to hide,you have nothing to fear’ is an oft repeated canard, perpetrated by those in power.Privacy is a INFORMATION SECURITY basic human need,and the powers we grant for intrusion into it should be clear,justified and limited; not subject to weasel wording or secret interpretations and agreements. Finally, sometimes we are our own worst enemy so need to be on the lookout for ourselves and others, paying heed to warnings and fighting our own nature. www.bcs.org/security When it comes to dealing with security threats we need to be constantly vigilant says Gareth Niblett,Chairman of the BCS Information Security Specialist Group. Information Security Specialist Group (ISSG): www.bcs-issg.org.uk Information Risk Management and Assurance Specialist Group: www.bcs.org/groups/irma BCS Security Community of Expertise (SCoE): www.bcs.org/securitycommunity FURTHER INFORMATION doi:10.1093/itnow/bwu095©2014TheBritishComputerSocietyImage:iStock/153779269 28 ITNOW December 2014 STAY ALERT BC988/LD/AD/1114 WESETTHE STANDARDS WHENIT’S MISSION CRITICAL CESG Certified Professional Scheme. Independent assessment and verification for information assurance professionals. Now available for the private sector. bcs.org/ia BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no no. 292786) 2014

×