“Afghanistan Orders WhatsApp Blocked,” The Wall Street Journal, November 4, 2017 A9. Some providers don’t comply.
King Canute ordered the tides to recede. With limited success. Does your company issue policies that just won’t work? What does it say about the person issuing the policies and what does it say about your company’s culture? What about how well the company’s other policies will be adhered to?
Internet neutrality – is the power to regulate (and tax) the power to prohibit? Whether exercised or not?
How do you protect against intrusions (including hacking and viruses and ransomware)? Policies and technology, mainly. How do you protect against internal breaches (phishing, etc.)? Policies, training, and a bit of technology. How do you respond to an actual breach? Policies and procedures, training, and technology.
In the response, keep the notice requirements in mind. The rules vary from state to state.
“States Quiz Equifax on Disclosure,” The Wall Street Journal, October 30, 2017 B1. Several states initiate investigations into by Equifax’s delay in reporting after the hack that may have compromised the records of 145.5 million credit accounts. What did they know, when did they know it, and when did they report it, and to whom? Notice to the state, to the fed, to the consumers, and to investors? What’s reasonable, or what’s required by statute?
It’s all about notice. Given the business, should the directors have been on top of this?
Filed under Communications, Compliance, Controls, Corporation, Directors, Duty, Governance, Information, Interconnections, Internal controls, IT, Legal, Oversight, Requirements, Security, To report, Value
“Hackers Target Schools,” The Wall Street Journal, October 24, 2017 A3. Cyberthefts and ransomware attacks at a whole host of schools, targeting data on students, as well as the normal financial stuff.
So, how much money should schools spend to prevent hacking and subsequent release of student data? And isn’t it nice of the news media to report how much ransom the attackers got?
So, whose data is it, anyway? And who’s the custodian?
Filed under Access, Compliance, Controls, Duty, Duty of Care, Governance, Government, Information, Interconnections, Internal controls, IT, Oversight, Ownership, Protect assets, Security, Third parties, Value
“Countermove in Code War,” The Wall Street Journal October 24, 2017 B4. Kaspersky Lab promises to turn over the source code to deflect allegations that its antivirus software led to the compromise of some confidential US government documents.
What can you do when software you sell to protect information from infection is, itself, potentially infected? What business will you have if you can’t provide adequate assurances?
“Pacemaker Fix Against Hackers Raises New Fears,” The Wall Street Journal, October 21, 2017 B4. Will updating the software crash your pacemaker? Fix to prevent a potential hacker pathway.
A couple of information points. Software is information. Limiting unauthorized access to “my” pacemaker seems to be something the manufacturer should be responsible for. Who manages the risk of hacking? What about the risk of the change itself? Is this a doctor’s call or the patient’s call?
Filed under Access, Compliance, Controls, Corporation, Duty, Governance, Interconnections, Internal controls, IT, Risk, Security, Third parties
“Wi-Fi Flaw May Endanger Security,” The Wall Street Journal, October 17, 2017 B4. A wi-fi flaw opens up systems to hackers. Impact mostly for corporations, affecting WPA2 protocols. But does affect older Android phones and use of Wi-Fi networks while traveling.
Is cyber-security too complex for humans to understand?
Hopefully, the corporations will install the patches on a timely basis. What other steps should we take in the meantime?
“Australia Hack Nets Data on U.S. Arms,” The Wall Street Journal, October 13, 2017 A6. Hacker hacks a defense contractor’s computers and carried off “commercially sensitive data on sophisticated U.S. weapons systems.” The ease of the hack is mind-boggling.
Is there a common scheme here? Or otherwise solve this equation for X.
Filed under Access, Controls, Corporation, Duty, Governance, Government, Information, Interconnections, Internal controls, IT, Oversight, Protect assets, Security, Third parties, Vendors