10 Cybersecurity myths lurking in our heads
Cybersecurity-related scary stories bring out all the myths and beliefs you, as a manager, have about IT and security. We would like to address some common ones and try to dispel them for good.
Cybersecurity-related scary stories bring out all the myths and beliefs you, as a manager, have about IT and security. We would like to address some common ones and try to dispel them for good.
Earlier today, one of Estonia’s leading media portals Äripäev/Деловые ведомости (Part of Bonnier Group) got hit by a malicious DDoS (Distributed Denial of Service) attack. We have asked our colleague, Vladimir Jelov to share some insights and tips in not-so-technical terms. As of the time of writing, Cybers comments are based on publicly available information.
The elephant in the room being Schrem’s II ruling, which effectively invalidated Privacy shield between EU and USA. That in return led to a situation where US-based companies forced to provide access to customer data even by authorities are in breach European General Data Protection Regulation (GDPR).
For a long time, a good password policy has had 3 key factors: strong passwords, periodic change of passwords, and activation of Multifactor Authentication. Nowadays the value of periodic password change is questionable and many organizations, like NIST and Microsoft, find this obsolete and worthless.
Following this year’s cybersecurity summit we’ve run a small poll with our speakers to squeeze a few more drops of wisdom out them. We were half-expecting everyone to be saying the same things but to our surprise, there was a huge variety of thoughts.
Planning an international conference with tens of speakers and hundreds of guests is difficult. Planning one in a World with a deadly pandemic ranging outside makes it even more… challenging. Here is how it went for us and some tips along the way.