The House lawmakers has finally approved a cybersecurity legislation on Monday. This bill will secure the technologies used to protect critical infrastructure from any type of cyberattacks. The bill will still need to get approved by the Senate before being signed into law by the President.
During Facebook CEO Mark Zuckerberg congressional hearing on Capitol Hill, it was obvious that the Senators did not know anything about how the internet works or even how Facebook operated. Though Mr. Zuckerberg took full responsibility for the privacy lapse in the design of Facebook, it was clear that nothing was really resolved during this hearing. Continue reading “The Congressional Hearings Circus Show”
Having good IT security policies has become one of the most critical elements to any security program. A good policy should have a specific set of guidelines, procedures, and standards for any users who access any computer resource to follow. It will also make sure that all users of adhere to the requirements of protecting the confidentiality, integrity, and availability of the computer resources. A detail security policy and program can also help an organization out in the event of an audit, security violation, and justification for employee termination.
What is an insider threat? An insider threat is a malicious threat to an organization that comes from people within the organization. Insider threats have the ability of cause an organization a lot of money in damages, fines, and lawyer fees. Insider threats can occur when employees or privileged users leave their doors open to a secured facility, allowing user to piggyback on their access, leaving their computer screens unlocked, having usernames and passwords exposed, or pretty much anything that will allow for a “bad guy” to compromise the system through the network or through physical security. Insider threats usually occur through personal negligence, poor or inadequate security practices or a combination of both. Employee moral also has a potential to play significant role in how employees and user protect against insider threats.