Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member



Cyber ******* victims need to speak up, says ICO

With the majority of cyber attacks reported to the ***’s

This is the hidden content, please
(ICO) stemming from basic and common security mistakes, the regulator has said others would be better able to learn and everybody’s security postures might start to improve if victims felt empowered to be more transparent about their experiences.

The ICO said that over 3,000 breaches were reported to it in 2023, of which 22% affected organisations in the financial services industry, with the retail and education sectors accounting for 18% and 11% of reports respectively.

In the

This is the hidden content, please
 report, the ICO has compiled practical advice to help organisations better understand common security failings and take simple steps to improve their own security to prevent breaches before they can take place.

“People need to feel confident that organisations are doing as much as they possibly can to keep their personal information secure,” said Stephen Bonner, ICO deputy commissioner for regulatory supervision.

“While cyber attacks are growing more sophisticated, we find that many organisations are not responding accordingly and are still neglecting the very foundations of cyber security.

“As the data protection regulator, we want to support and empower organisations to get this right,” he said. “While there is no single solution to prevent cyber attacks, there is absolutely no excuse for not having the foundational controls in place. These are essential to protecting people’s personal information and we will take action, including fines, against organisations that are still not taking simple steps to secure their systems.

“If you do experience a cyber *******, we always encourage transparency as your mistakes could help another organisation to avoid a similar breach,” said Bonner.

Five causes of breaches

The report zeroes in on the five biggest causes of the breaches reported to the ICO, and for seasoned cyber professionals, the list should contain no surprises:

  • This is the hidden content, please
    , where users are tricked into sharing credentials, personal information, or downloading malware or ransomware;
  • This is the hidden content, please
    , where malicious actors use trial and error to guess weak username and password combinations;
  • Denial of service, where normal network or system operations are slowed or stopped by being overloaded with malicious traffic;
  • This is the hidden content, please
    , where settings have been misconfigured, poorly implemented, not maintained or left on default;
  • This is the hidden content, please
    , where products, services or technology used at an organisation are compromised and used to infiltrate its systems. 

The report lays out more detail about how such attacks take place, key considerations needed to mitigate the risk, and how the landscape might develop in the future. It also contains a number of case studies drawn from the ICO’s regulatory activities.

Eleanor Fairford,

This is the hidden content, please
deputy director for incident management, said: “As more organisations report cyber incidents, it is ever-more crucial to have strong online defences to reduce the risk of falling victim and to protect personal information.

“The NCSC is committed to helping organisations raise their cyber resilience, and we urge leaders to make use of the wide range of practical guidance and free services available on the NCSC website. If the worst should happen, we encourage reporting incidents to the authorities to access expert support and help break the cycle of ******.”





This is the hidden content, please

#Cyber #******* #victims #speak #ICO

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.