Connect with us


You’ve been hacked, now what? How the UK’s cybersecurity and privacy watchdogs deal with incidents



Who needs the Dark Web when there’s Facebook? 74 groups caught selling hacked data
Researchers at Cisco Talos uncover 74 Facebook groups being used for illicit activity by hundreds of thousands of users.
Read more:

The UK’s data privacy watchdog and its cybersecurity agency have outlined how the two work together with companies that have been hacked. 

The National Cyber Security Centre, the cybersecurity arm of GCHQ and the UK’s technical authority on cyber threats, and the Information Commissioner’s Office (ICO), the UK’s independent data protection authority, are separate entities – but both have roles in the event of cyberattacks.

While the NCSC aims to provide help and guidance to organisations that have fallen victim to malicious attacks, and prevent them happening in the first place, the ICO aims to monitor and enforce General Data Protection Regulation (GDPR). Under GDPR, organisations need to contact the ICO in the event of a breach so that the ICO can take appropriate remedial action.

SEE: 10 tips for new cybersecurity pros (free PDF)

In a joint session at the NCSC’s CYBERUK 19 conference in Glasgow, the NCSC and the ICO outlined how the two organisations work together and create a better understanding for cyberattack victims who need to contact them with the aim of making it easier to deal with the right one at the right time.

“It’s important organisations understand what to expect if they suffer a cybersecurity breach. The NCSC has an important role to play in keeping UK organisation safe online, while our role reflects the impact cyber incidents have on the people whose personal data is lost, stolen or compromised,” said ICO deputy commissioner for operations, James Dipple-Johnstone.

“Organisations need to be clear on the legal requirements when to report these breaches to the ICO, and the potential implications, including sizeable fines, if these requirements aren’t followed.”

In the event of a cyberattack, the NCSC will engage directly with victims to understand the nature of the incident and provide free and confidential advice to help mitigate its impact in the immediate aftermath. The NCSC will also encourage affected organisations to meet requirements under GDPR – the need to report the incident to the ICO. But it will not share information reported to it on a confidential basis with the ICO without first seeking the consent of the organisation concerned.

The ICO, meanwhile, sets out to help organisations mitigate risks and set up investigations into the incidents. It will check that organisations have adequately protected any personal data put at risk and have properly met their legal responsibilities. If they’re found not to have done so, they could be fined under GDPR.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)

The ICO and the NCSC share anonymised and aggregated information with each other to assist with their understanding of risk and work together to promote cybersecurity and resistance to threats.

“This framework will enable both organisations to best serve the UK during data breaches, while respecting each other’s remits and responsibilities. The development of this understanding is as a result of a constructive working relationship between our organisations, and we remain committed to an open dialogue on strategic issues,” said NCSC CEO Ciaran Martin.

“While it’s right that we work closely together, the NCSC will never pass specific information to a regulator without first seeking the consent of the victim,” he added.

Going forward, the NCSC will also set out additional information on its working relationship with other law enforcement colleagues who respond to cyberattacks in an effort to further boost clarity.


Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Key Criteria for Evaluating Unified Endpoint Management



Endpoint management is one of the most significant challenges in the enterprise today. An increasingly large percentage of our workforce is distributed and demands flexibility to work wherever they want, whenever they want. We must respond by giving them access to the services they require to do their jobs effectively. The alternative is that we, as a business, will suffer, lose good people, and become less competitive. However, we must achieve this essential access while maintaining security and control of our business’s data assets.

An appropriate endpoint management strategy is key to addressing these issues. Our approach should be holistic and unified, bringing together control of devices, management of applications, security of data, and access controls.

Unified endpoint management (UEM) is the approach to meeting this challenge. It has evolved from traditionally disparate solutions for endpoint management, application delivery, and security into a single platform. This single platform delivers a consistent end-user experience across all devices, applications, and locations while maintaining security and control of data assets. The leading solutions allow us to enroll devices easily into our control, provide support, and ensure constituency and compliance while managing access to our applications and data.

This GigaOM Key Criteria Report describes UEM solutions and identifies key criteria and evaluation metrics for selecting such a solution. The corresponding GigaOm Radar Report identifies vendors and products that excel in this sector. Together, these reports give decision-makers an overview of the market to help them evaluate existing platforms and decide where to invest.

How to Read this Report

This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding consider reviewing the following reports:

Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.

GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.

Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.

The post Key Criteria for Evaluating Unified Endpoint Management appeared first on Gigaom.

Continue Reading


Data Storage for Ever Changing Business Needs



Join GigaOm analyst Enrico Signoretti and CTERA CTO Aron Brand in this one-hour live webinar as they explore file storage trends and dynamics through the lens of IT infrastructure modernization projects.

The file and cloud experts will discuss the limitations of traditional NAS architectures in today’s corporate environments and how organizations are implementing distributed cloud file storage to solve remote collaboration, ransomware protection, and unstructured data growth challenges.

Signoretti and Brand will also examine the recently published GigaOm Radar for Distributed Cloud File Storage, in which CTERA was named the leader. They will review the report’s key criteria and evaluation metrics for choosing a distributed cloud file storage platform, helping IT leaders to understand which vendors are most aligned to their needs today as well as 12-18 months down the road.

The post Data Storage for Ever Changing Business Needs appeared first on Gigaom.

Continue Reading


High Performance Application Security Testing – Cloud WAF Security Platforms



This free 1-hour webinar from GigaOm Research features analyst Jake Dolezal and will focus on comparing Web Application Firewall (WAF) security platforms in an enterprise with high performance needs.

This webinar will discuss web application security mechanisms deployed in the cloud. The cloud enables enterprises to differentiate and innovate with microservices at a rapid pace. However, the cloud is just as vulnerable, if not more so, to attacks and breaches as on-premises APIs and apps are. Our focus is specifically on approaches to securing apps, APIs, and microservices that are tuned for high performance and availability. We define “high performance” as companies that experience workloads of more than 1,000 transactions per second (tps) and require a maximum latency below 30 milliseconds across the landscape.

In this webinar, we will reveal the performance tests of security mechanisms on NGINX, AWS, and Azure, specifically: ModSecurity, NGINX App Protect WAF, AWS Web Application Firewall (WAF), and Azure WAF.

Register now to join GigaOm and NGINX for this free expert webinar.

The post High Performance Application Security Testing – Cloud WAF Security Platforms appeared first on Gigaom.

Continue Reading