🚨CISA & NSA release Crucial Guide on Network Segmentation and Encryption in Cloud Environments🚨 In response to the evolving requirements of cloud security, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a comprehensive Cybersecurity Information Sheet (CSI): "Implement Network Segmentation and Encryption in Cloud Environments." This document provides detailed recommendations to enhance the security posture of organizations operating within cloud infrastructures (that probably means you). Key Takeaways Include: 🔐 Network Encryption: The document underscores the importance of encrypting data in transit as a defense mechanism against unauthorized data access. 🌐 Secure Client Connections: Establishing secure connections to cloud services is fundamental. 🔎 Caution on Traffic Mirroring: While recognizing the benefits of traffic mirroring for network analysis and threat detection, the guidance cautions against potential misuse that could lead to data exfiltration and advises careful monitoring of this feature. 🛡️ Network Segmentation: Stressed as a foundational security principle, network segmentation is recommended to isolate and contain malicious activities, thereby reducing the impact of any breach. This collaboration between NSA and CISA provides actionable recommendations for organizations to strengthen their cloud security practices. The emphasis is on strategically implementing network segmentation and end-to-end encryption to secure cloud environments effectively. Information security leaders are encouraged to review this guidance to understand better the measures necessary to protect cloud-based assets. Implementing these recommendations will contribute to a more secure, resilient, and compliant cloud infrastructure. Access the complete guidance provided by the NSA and CISA to fully understand these recommendations and their application to your organization’s cloud security strategy. 📚 Read CISA & NSA's complete guidance here: https://lnkd.in/eeVXqMSv #cloudcomputing #technology #informationsecurity #innovation #cybersecurity
Data Privacy In Remote Work Settings
Explore top LinkedIn content from expert professionals.
-
-
☁️"Domestic is not sovereign, nor is it necessarily safe." haunting words from Simon about what “sovereign” really means. Many assume that if servers are located in an Australian data centre, their data is both sovereign and safe, let me throw a curve ball to make it more complex. 📃Take a look at two U.S. laws: the USA PATRIOT Act (2001) and the U.S. CLOUD Act (2018), together, they give U.S. authorities sweeping powers to access data held by American companies (*cough* no matter where in the world that data sits, including Australia). ➡️Under the Patriot Act, agencies gained expanded surveillance rights to compel access to business and personal records in the name of national security. 🎯The Cloud Act takes that reach further, allowing the U.S. Government to demand data from U.S.-based providers, even if those servers are hosted here in Australia. ⚠️This means that although you may have a “secure” Azure, AWS, or Google instance located onshore, those environments are still bound by U.S. jurisdiction. Encryption helps, but how many organisations actually implement robust, end-to-end encryption and manage their keys 🔑independently? ✅Sovereignty aside, misconfiguration risk is already a major issue, here's some FACTS: - 27% of organisations report a public cloud breach according to SentinelOne. - Around 9% of cloud storage is publicly accessible, and 97% of that exposed data is sensitive according to Tenable - 21% of exposed S3 buckets contain sensitive data due to poor access controls. 🗺️So sure, location matters, BUT, legal jurisdiction and configuration controls matter more. Simply hosting workloads onshore doesn’t guarantee sovereignty or safety. What protects your business is a layered strategy: encryption, independent key management, rigorous configuration governance, continuous monitoring, and a complete understanding of the regulatory landscape you’re operating under. 👉 Don’t turn a blind eye by where your cloud is. Focus on who controls it, what laws apply, and how it’s secured. Need help in understanding your requirements, AND, securing your cloud environment? Why not reach out to the cloud and security experts at ASE Tech. #ShiftHappens #DataCentre #ThinkBeforeYouClick
-
Ever handed someone a USB that looked harmless—but wasn’t? I have. In the world of espionage, we had some very cool toys. I once handed a “special” USB device to an asset who had access to a sensitive network the intel community needed eyes on. It looked harmless. Ordinary, even. But it wasn’t. In our world, that was tradecraft. In your world? That same-looking USB might be swag from a conference booth. Except… the risk is the same. Insecure devices don’t just open backdoors — they open headlines, lawsuits, and trust gaps you can’t patch overnight. Here are some real-world examples: Military Smartwatch Scam (2023): U.S. Army personnel received unsolicited smartwatches. Turning them on triggered automatic connections to nearby phones and Wi-Fi, deploying malware to harvest sensitive data — and possibly camera access. The source? Overseas. The goal? Espionage and fake seller reviews. Juice Jacking: The FBI warns that public USB charging ports (airports, hotels, cafes) can silently install malware or tracking tools — a tactic known as juice jacking. USB Drop Attacks: Malicious actors leave infected USBs in public places, hoping someone plugs them in. One click, and it’s game over: data theft, ransomware, or remote access. Wearable Device Vulnerabilities: Many smartwatches and fitness trackers lack Bluetooth security, leaving them open to eavesdropping or active attacks — especially when cheaply made. Just because it's branded doesn’t mean it’s safe. Just because it's free doesn’t mean it’s clean. Here’s what can we do better: Training & Awareness ✔️ Educate your team: Make device security part of onboarding and training ✔️ Warn about giveaways: Just because it’s branded doesn’t mean it’s safe. ✔️ Teach skepticism: Don't take or plug in USBs or devices from people you don’t know. (Yes, even from the booth with free espresso.) Policy & Prevention ✔️ Enforce a USB device policy: Monitor or restrict device access ✔️ Vet your swag: Vendors, stop buying bulk tech giveaways from unverified sources. ✔️ Avoid public USB stations: Use your own charger and plug into the wall (old school) Technical Controls ✔️ Use endpoint protection to scan devices before connection ✔️ Regularly audit and update security protocols ✔️ Monitor for unexpected RF, BLE, or Wi-Fi activity — especially in secure spaces Your attack surface isn’t just digital. Sometimes it comes with a logo and a lanyard or a blinking blue light. If you’re a leader, ask yourself: - How are you securing your humans from hardware-level risks? - Does your team know what to do when something looks ordinary… but isn’t? - Do your giveaway devices come with supply chain transparency? Stay sharp. Stay skeptical. Stay secure. #HumanRisk #Cybersecurity #SpycraftForRealLife #SupplyChainRisk #CyberHygiene #LeadershipInSecurity #Espionage #ConferenceCulture #dataprotection #securityawareness #Spycraftfortheheart
-
Your home and office devices can be used in cyberattacks. Here’s what to do. The US government disrupted a Chinese hacking operation that utilized compromised small office and home office network equipment, including routers, firewalls, and VPN hardware to route their traffic. But employing simple cyber hygiene we will discuss below can keep your home, your business and/or your company safe. How Hackers Invaded: Hackers exploited vulnerabilities in outdated devices, especially those nearing "end-of-life" status and no longer receiving security updates. They then used known weaknesses to gain control and reroute their malicious traffic through these devices, making it harder to detect their real targets. Why They Do It: These compromised devices act as "stepping stones," hiding the hackers' tracks and making it harder to pinpoint their true intentions. It's similar to the 2016 attack on internet provider Dyn, when hackers launched a massive internet outage affecting websites such as Amazon, PayPal, Walgreens, Visa, CNN, Fox News, Wall Street Journal, and the New York Times. At that time, hackers took control of routers, cameras, Printers, and other devices by using the default password coming out of the factory. 🛡 Simple Steps to Secure Your Home and Office: ➡️ Update, Update, Update: Regularly update your router, firewall, VPN, and all connected devices with the latest security patches. Most devices offer automatic updates - enable them! ➡️ Ditch the old tech: If your router or other devices are nearing end-of-life, invest in newer, secure models. ➡️ Password Power: Set strong, unique passwords for all your devices and enable two-factor authentication wherever possible. Hackers love easy prey, make them work for it! ➡️ Firewall Fortitude: Enable your firewall and anti-virus and configure both to detect and block suspicious activity. Think of it as a security guard for your digital life. For Companies: While the above advice works for both individuals and companies, companies should assume they will be hacked and be prepared. The preparation must include at least: ♦︎ Off-network backup, ♦︎ Incident response action plan ♦︎ Disaster recovery plan What are you doing to keep your home equipment and your company secure? #cyberdefence #cybersecurity #levelUpYourLi _______________ ➡️ I am Talila Millman, a fractional CTO, a management advisor, a keynote speaker, and an executive coach. I help CEOs and their C-suite grow profit and scale through optimal Product portfolio and an operating system for Product Management and Engineering excellence. 📘 My book The TRIUMPH Framework: 7 Steps to Leading Organizational Transformation will be published in Spring 2024. You can preorder a signed copy on my website Image credit: Bing AI powered by DALL-E3
-
By not anonymizing data (specially personal) before use it for training models, organizations expose themselves and individuals to significant risks, including legal, financial, and reputational harm. 🚩 🚩 🚩 The choice of a right technique depends on the specific requirements, context, and regulations governing the data's use while balancing the need for privacy and data utility. Let us review some popular data anonymization techniques 👇 1️⃣ Masking or Redaction: In a dataset containing customer information, sensitive attributes like names, addresses, or phone numbers are masked or redacted by replacing them with pseudonyms or removing them entirely. For instance, "John Smith" may be replaced with "Customer A" or completely removed. 2️⃣ Generalization: Instead of storing exact birthdates, age ranges are used. For instance, the birthdates "1985-03-15" and "1990-08-21" can be generalized to "30-40" and "25-35" respectively, representing age groups. 3️⃣ Suppression or Deletion: In a dataset containing medical records, specific sensitive attributes like diagnoses or test results may be completely removed or suppressed to prevent the identification of individuals. 4️⃣ Aggregation: Instead of individual transaction records, data is aggregated to provide summary statistics. For instance, instead of listing each purchase, the dataset may include the total number of transactions per day or the average amount spent per customer. 5️⃣ Perturbation or Noise Addition: Adding random noise to numerical data to mask the exact values while preserving statistical properties. For example, adding a small random value to income figures, such that $50,000 becomes $50,123 or $49,876. 6️⃣ Data Swapping: Swapping certain attributes between individuals within the dataset to break direct links. For instance, swapping ages between individuals, ensuring that the age information no longer matches the original person. 7️⃣ Data Encryption: Sensitive data can be encrypted using cryptographic techniques, making it unreadable without the appropriate decryption key. This ensures that only authorized parties can access and interpret the information. 8️⃣ Differential Privacy: Adding controlled noise or perturbation to query results to protect individuals' privacy while still allowing statistical analysis. Differential privacy techniques ensure that individual contributions remain indistinguishable in the final results. #dataprotection #datamodeling
-
In a data-driven world, considering ethical implications is a responsibility for all kinds of data jobs. Here are the ethical considerations you will face: 1. 𝗗𝗮𝘁𝗮 𝗣𝗿𝗶𝘃𝗮𝗰𝘆: While collecting and analyzing data, you need to respect individual privacy. Anonymize data whenever possible and ensure compliance with regulations like GDPR. 2. 𝗕𝗶𝗮𝘀 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝗠𝗶𝘁𝗶𝗴𝗮𝘁𝗶𝗼𝗻: Algorithms are only as unbiased as the data they're trained on. Actively seek out and correct biases in your datasets to prevent promoting stereotypes or unfair treatment. 3. 𝗧𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝗰𝘆: Be open about the methods, assumptions, and limitations of your work. Transparency builds trust, particularly when your analysis influences decision-making. 4. 𝗔𝗰𝗰𝘂𝗿𝗮𝗰𝘆: Double-check your findings, validate your models, and always question the reliability of your sources. 5. 𝗜𝗺𝗽𝗮𝗰𝘁 𝗔𝘄𝗮𝗿𝗲𝗻𝗲𝘀𝘀: Consider the broader implications of your analysis. Could your work unintentionally harm individuals or communities? 6. 𝗖𝗼𝗻𝘀𝗲𝗻𝘁: Ensure that data is collected ethically, with consent where necessary. Using data without permission can breach trust and legal boundaries. Ethics in data is not only about adhering to rules, but about fostering a culture of responsibility, respect, and integrity. The impact of ignoring those topics can be significant for your company due to losing the trust of your customers or substantial legal penalties. As an analyst, you play an important role in upholding those ethical standards and protecting your business. How do you incorporate ethical considerations into your data analysis process? ---------------- ♻️ Share if you find this post useful ➕ Follow for more daily insights on how to grow your career in the data field #dataanalytics #datascience #dataethics #ethics #dataprivacy
-
Letter H: Hybrid Work: Protecting an Organization with a Hybrid Workforce Our "A to Z of Cybersecurity" tackles Hybrid Work - the new normal with employees working both remotely and on-site. However, a dispersed workforce introduces new security challenges. Let's bridge the security gap and keep your hybrid castle safe: Fortifying Your Defenses: · Secure Remote Access: Implement strong authentication and access controls for remote connections. · Endpoint Security: Deploy robust security software on all devices, regardless of location. · Data Loss Prevention (DLP): Prevent sensitive data from being accidentally or maliciously shared outside the organization. United We Stand: · Collaboration Tools: Use secure collaboration platforms to share information and foster teamwork. · Cloud Security: Choose cloud service providers with robust security measures and educate employees on secure cloud usage. · Zero Trust Architecture: Implement a security model that verifies access for all users, regardless of location or device. Hybrid work offers flexibility, but security remains paramount. By building strong defenses, fostering awareness, and implementing secure collaboration tools, you can create a safe and productive hybrid environment for your organization. #Cybersecurity #HybridWork #A2ZofCybersecurity
-
Remote work has become increasingly popular over the past few years, and the COVID-19 pandemic only accelerated this trend. While remote work offers many benefits, it also comes with its own set of security challenges. To keep your team and your company safe, it's important to follow these remote worker best practices: ✅Use strong and unique passwords: Encourage remote workers to use complex passwords that are difficult to guess. It's also important to use different passwords for different accounts to minimize the impact of a potential breach. ✅Enable multi-factor authentication (MFA): This can help prevent unauthorized access to accounts. ✅Be cautious of phishing emails: Phishing emails are a common method used by cybercriminals to trick users into revealing sensitive information. Teach remote workers how to identify suspicious emails and avoid clicking on suspicious links or downloading attachments from unknown sources. ✅Keep software and devices up to date: Regularly updating software and devices is crucial for maintaining security. Updates often include important security patches that address vulnerabilities and protect against potential threats. ✅Use a virtual private network (VPN): A VPN creates a secure connection between a remote worker's device and the company's network. This helps protect sensitive data by encrypting the connection and making it more difficult for hackers to intercept. ✅Secure home Wi-Fi networks: Remind remote workers to secure their home Wi-Fi networks with strong passwords and encryption. This helps prevent unauthorized access to their network and protects sensitive data. ✅Educate employees on cybersecurity best practices: This can include topics like identifying social engineering tactics, avoiding public Wi-Fi networks, and safely handling sensitive information. By following these best practices, remote workers can help keep themselves and their companies safe from cyber threats. Stay safe 🔒
-
As founder of a remote data company, I’m increasingly aware of the impact that remote working poses to data privacy. While the flexibility of remote work has been a welcome change for many, it also raises important questions about data security and privacy. Despite not having a centralised office, at Onyx Data we take a number of steps to ensure our clients' data is all handled securely. Here are some key points to consider: Secure Access - It's essential to ensure that employees can access company resources securely from any location. Implementing strong VPNs and multi-factor authentication is a must. Data Encryption - With sensitive information frequently shared across networks, we use end-to-end encryption for all data, both in transit and at rest. Employee Training - Regular training on cybersecurity best practices can significantly reduce the risk of data breaches caused by human error. Device Management - Utilising Mobile Device Management (MDM) solutions helps secure company data on personal devices used for work purposes. Remote work doesn’t have to come at the expense of protected data. It is possible to have both - successfully. I’d love to hear your thoughts in the comments below on on how we can better balance remote work and data privacy - what would you add to the list? #RemoteWork #DataPrivacy #Cybersecurity
-
NSA Releases Top Ten Cloud Security Mitigation Strategies “Unfortunately, the aggregation of critical data makes cloud services an attractive target for adversaries. This series provides foundational advice every cloud customer should follow to ensure they don’t become a victim.” ~ Rob Joyce, NSA’s Director of Cybersecurity The ten strategies are covered in the following reports 1. Uphold the cloud shared responsibility model 2. Use secure cloud identity and access management practices 3. Use secure cloud key management practices 4. Implement network segmentation and encryption in cloud environments 5. Secure data in the cloud 6. Defending continuous integration/continuous delivery environments 7. Enforce secure automated deployment practices through infrastructure as code 8. Account for complexities introduced by hybrid cloud and multi-cloud environments 9. Mitigate risks from managed service providers in cloud environments 10. Manage cloud logs for effective threat hunting Full article with each strategy report in the comment 👇🏾 #cybersecurity #cloudsecurity #cloudsec
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Healthcare
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development