INFORMATION

Site Map - Cybersecurity

Quick Bytes: Unsafe workers.

- Seventeen percent of employees have launched a hacking tool or keystroke-logging software on their network in the past year, an increase from 12 percent from the year before. That’s no surprise given that 47 percent of the 351 IT decision-makers interviewed by Websense said employees who received phishing e-mails clicked on the link they found in the message, while a third of those interviewed admitted that they don’t block executables in e-mails. The annual Web@Work survey interviewed 351 information technology managers from U.S. companies of all sizes. @ More results of the survey are at SM Online.

Quick Bytes:Manager’s IT guidebook.

- Anyone looking for an overview of the elements that make up an information security program can turn to a comprehensive guide released by the National Institute of Standards and Technology (NIST) titled Information Security Handbook: A Guide for Managers. The handbook covers every aspect of security, from awareness and training issues to incident response and recovery strategies. Intended for senior managers, it’s as appropriate for the private sector as it is for government readers; as the authors note, while private- and public-sector requirements may differ, “the underlying principles of information security are the same.” @ Security Management Online has the NIST handbook.

Quick Bytes: Cybersecurity framework

- The National Science and Technology Council has released the Federal Plan for Cyber Security and Information Assurance Research and Development. The plan provides “baseline information and a technical framework for coordinated multiagency R&D in cyber security and information assurance.” It covers vulnerabilities, threats, and risk, and provides technical perspectives on subjects ranging from authentication and access control to wireless to software testing and assessment tools. An appendix provides roles and responsibilities of the members of the working group that created the report.@ The Report is at SM Online.

Quick Bytes: Metrics

- Guide for Developing Performance Metrics for Information Security analyzes legislative requirements, describes linkages between strategic planning and information security, and explains types of performance metrics.

Quick Bytes:ID theft basics

- Do financial services firms have to encrypt customer data? Also, a computer on a stick, and a cybersecurity checklist for business managers.

In for Nasty Weather

- WeatherBug operates some 8,000 weather stations around the country, providing live local weather data to end users. “We’ve married this with detailed weather intelligence from the National Weather Service, radar information, [and] lightning information, and we can get down to a five-kilometer-grid resolution providing truly neighborhood-level weather information,” Jim Anderson, WeatherBug’s director of business development, explained in a recent Webinar.

Growing Threat to Online Applications

- Wireless continuity between access points, Web 2.0 under increasing attack, local weather updates, and more

Cell Networks Evolve Into Data Networks

- Wireless continuity between access points, Web 2.0 under increasing attack, local weather updates, and more

Getting Ahead in IT

- If you are an IT security professional or are interested in becoming one, you’ll find a new career guide issued by (ISC)2 to be a helpful resource. The guide describes the types of jobs available (including typical job titles) and explores the various areas of expertise within information security, as well as educational requirements, technical skills needed, salary ranges, and the certifications that can help you advance your career. The guide also includes a list of schools offering IT security curricula and relevant professional associations. @ Career Guide: Decoding the Information Security Profession is at SM Online.

Numbers

- Number of daily cyberattacks launched against credit unions

Cybersecurity Checklist for Business Managers

- John Bumgarner, research director for security technology with the US-CCU, says that the idea for the checklist evolved because, despite the number of industry-specific guidances (such as Sarbanes-Oxley and ISO standards), there was nothing aimed at nontechnical managers.

Worth a Look: Computer on a Stick

- COS is a USB token with an entire Linux operating system on it as well as a host of handy applications, including an e-mail client, the Firefox Web browser, and a PDF creator and viewer.

To Encrypt or Not to Encrypt? That is the Question

- Do financial services firms have to encrypt customer data? Also, a computer on a stick, and a cybersecurity checklist for business managers.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.