“What’s in your wallet…?” Now we all know, thanks to Capital One’s data breach of 106 million customers. So why didn’t Capital One ensure its own cybersecurity?
The Perfect Storm: Dynamic Industry, Low Rewards and Limited Skills
Most organizations cannot keep up with technology’s ever -and rapid- changing landscape. Today, there is too much change, insufficient talent, and not enough time allocated to doing things properly. Sadly, problems are woefully understated as many serving in technology roles lack the required competencies to ensure business cybersecurity is conducted effectively.
Today, MSPs (managed service providers) and MSSPs (managed security service providers) face unique challenges meeting the threats and business requirements of cybersecurity. Not only must they ensure that their network service delivery platform is secure from cyberbreaches, but they must also ensure the customers with whom they connect are secure so bad actors can’t use their customer to pivot into their platform.
Imagine leading an air combat mission. Although the enemy is advancing, you’re not overly concerned because you have an overwhelming advantage: Your weapons are second-to-none; stealthy, responsive and lethal - there’s no way you can lose the battle. Then you learn your ‘foolproof’ mission has been jeopardized because you have no pilots trained to fly jets; the team you’ve been given are all helicopter pilots.
Each morning, after booting up my laptop, grabbing a cup of coffee and checking my email, I read the latest cybersecurity news from the Wall Street Journal (WSJ Pro Cybersecurity). If you are in the IT industry, especially focused in Cybersecurity, I highly recommend subscribing. One morning a particular article caught my attention.
October is always a turning point seasonally – but did the roots planted during CyberSecurity Awareness Month (NCSAM) bloom all the way into springtime? The short answer is yes. This designation, launched by the Department of Homeland Security (DHS) and the National Cyber Security Alliance back in 2004, has remained steadfast, unwavering in relevance, importance end effectiveness.
With security threats becoming more advanced, security and information management must be top priority. Education and awareness are essential. Whether its best practices, security trends, or developing a foundational knowledge of security technologies, being informed is paramount.Tech Data’s Security Practice Foundations blog series can help you build a strong foundation of security knowledge.
With security threats becoming more advanced, Security and Information Management need to be a top priority. Education and awareness are essential. Whether its best practices, security trends, or developing a foundational knowledge of security technologies, being informed is paramount. TechData’s Security Practice Foundations blog series can help you build a strong foundation of security knowledge.
Giving Credit Where Credit’s Due
Credit cards have permeated our lives as far back as 1946 when Brooklyn, NY banker John Biggins created Charg-It, the first bank card in the U.S. but limited to local Brooklyn merchants only. Four years later, expanding on the initial Charg-it concept, the Diner’s Club Card was introduced.