Posts

Showing posts from May, 2023

CyberSecurity Article – 17 (CIOs & CISOs Are Not Solely Responsible for Information Security)

Image
CyberSecurity Article – 17 ( CIOs & CISOs Are Not Solely Responsible for Information Security) It's true that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) play critical roles in managing Information Security within any organizations , however they are not solely responsible for it . In the past, there was a common perception that CIOs and CISOs were solely responsible for information security within organizations, however this view has evolved over time and it is now widely recognized that information security is a shared responsibility or a collective effort that involves multiple stakeholders across the organization , all employees from the top leadership down to individual contributors have a role to play in protecting information assets. While CIOs and CISOs still hold crucial roles in driving information security strategies and implementing security measures , they are now viewed as enablers and facilitators ...

CyberSecurity Article – 16 (Secure Methods for Ensuring Data Integrity)

Image
CyberSecurity Article – 16 (Secure Methods for Ensuring Data Integrity) Data integrity refers to the overall accuracy, consistency and reliability of data throughout its lifecycle . It ensures that data remains complete, consistent and trustworthy from creation or capture to storage, processing and retrieval. In more technical terms, data integrity is the assurance that data remains intact and unaltered in its original form  without any unauthorized or unintended modifications, corruption or loss. It involves maintaining the quality and reliability of data, preventing data errors or inconsistencies, and ensuring the data's fidelity and adherence to business rules, constraints, or standards. Methods to ensure data  integrity: Cryptographic Hash Functions: by this method you could verify if the data has been tampered.   Even a slight change in the data will result in a significantly different hash value. Message Authentication Codes (MAC): MAC algorithms, su...

CyberSecurity Article – 15 (Data Breaches By Using Common Passwords | Millions of people at risk)

Image
CyberSecurity Article – 15 (Data Breaches By Using Common Passwords | Millions of People At Risk) In this age of Advanced Technology where cyberattacks are becoming more sophisticated and hackers are continuously working 24/7 to gain unauthorized access to sensitive information , it is surprising to know that despite knowing the risks involved, people are still using common passwords that are easy to Guess & Crack. Millions of people around the world are continuing to use passwords such as “12345” and “password” despite the increasing risk of data breaches and cyberattacks. This is a real concern as weak passwords are easy to guess or crack using automated tools, leaving accounts vulnerable to unauthorized access and sensitive data at risk of being stolen or compromised. The password “123456” was the most commonly used password with “123456789”, “qwerty”, “password” and “12345” all featuring in the top five. Top 10 most common passwords: 1. ( 123456) | 2. ( 12345...

CyberSecurity Article – 14 (Unified user profiles | Importance & Risks)

Image
CyberSecurity Article – 14 (Unified user profiles | Importance & Risks) A unified user profile is a single digital identity that aggregates and stores user data, preferences and permissions across multiple systems, applications, and devices. It is a central repository that contains all relevant information about a user such as their name, email address, contact information, login credentials, preferences and permissions. Unified user profiles allow users to access multiple applications and services using a single set of credentials  and their preferences and settings are automatically synced across all devices and platforms.   This helps to eliminate the need for users to remember multiple usernames & passwords and reduces the friction associated with switching between different applications. Unified user profiles offer several benefits  such as streamlined user experience, improved security and better data management. However, there are also some poten...