net.extend takes part in Munich Cyber Security Conference 2019

Addressing top level managers and executives from the private and public sectors, the Munich Cyber Security Conference (MCSC) offers a unique space for exchanging and discussing solutions to the manifold challenges in information and cyber security. Focusing on the role and responsibility of decision-makers, the conference emphasizes effective strategies and agile management concepts to deal with the current threat landscape and also provides insight into the future evolution of cyber security policies.

Munich Cyber Security Conference 2018 / Hotel Bayerischer Hof / MCSC / 15.02.2018 Foto: Security Network Munich / Stephan Goerlich www.stephan-goerlich.de

MSCS always takes place the day before the Munich Security Conference (MSC). Ambassador Wolfgang Ischinger, Chairman of the Munich Security Conference, is Patron of the Munich Cyber Security Conference.

Global Risk Report: Cyberattacks are in top 4 !

Cybersecurity risks are growing, both in their prevalence and in their disruptive potential. Attacks against businesses have almost doubled in five years, and incidents that would once have been considered extraordinary are becoming more and more commonplace. The financial impact of cybersecurity breaches is rising, and some of the largest costs in 2017 related to ransomware attacks, which accounted for 64% of all malicious emails. Notable examples included the WannaCry attack—which affected 300,000 computers across 150 countries—and NotPetya, which caused quarterly losses of US$300 million for a number of affected businesses. Another growing trend is the use of cyberattacks to target critical infrastructure and strategic industrial sectors, raising fears that, in a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning.

Read more …

75% of CEOs use applications that aren’t approved by IT

CEOs and business decision makers (BDMs) say they understand the massive cybersecurity risks facing organizations today. However, that does not stop 75% of CEOs and 52% of BDMs from using applications and programs that are not approved by their IT department, according to a new report from Code42. About half of these professionals said they have experienced a security breach within the last 18 months.

Read more …

(Deutsch) How to Spot the Six Archetypes of Insider Threat

Sorry, this entry is only available in German. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.

Every day, data walks out the doors of businesses around the globe. Sometimes this data exfiltration is unintentional, other times it’s malicious. Often what’s taken is harmless, but sometimes it’s valuable company IP or sensitive material. With IP accounting for 80 percent of a company’s value, the potential impact of insider threat is enormous.

Read more …

WSJ warns of ransomware—misses the obvious solution

ransom_2

Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserves, but why discuss the problem and leave out the obvious, simple antidote? It’s like an article on a bike theft epidemic that fails to mention that none of the bikes were locked up.

Read more …

Wall Street Journal: The Best Way to Back Up Your Computer

By Geoffrey A. Fowler
Updated March 4, 2015

There are two types of hard drives: those about to fail, and those that will fail eventually. Plan accordingly.

Online backup is effective because it does the worrying for you. The cloud is less susceptible to loss than running (or, heaven forbid, thwacking) your own farm of backup drives. The cloud is protected from fire, flood, theft and your cat. You can access online archives from anywhere, including on your phone. And it makes sense if you’re already paying an arm and a leg for fast, unlimited broadband.

Read more …