BCM-News Daily Digest
- How to deal with the aftermath of a data breach
From the major HMRC breach of 2007 to those recently suffered by TalkTalk and VTech, we have seen time and again that no matter the size of the business or vertical, anyone can suffer. So if it could happen at any time, a plan of action is the best tactic. - Wiesenhof: Feuer in Lohne gelöscht, Schlachtungen verlagert – SPIEGEL ONLINE
Der Großbrand beim Geflügelschlachter Wiesenhof ist gelöscht, nun sollen Experten die Brandursache ermitteln. Der Sachschaden dürfte in die Millionen gehen, das Unternehmen verlagert die Produktion. - Wenn der Hacker auf dem CAN-Bus sitzt
Die Auto-IT hat ein Problem: Forscher der Allianz-Versicherungsgruppe haben unzulängliche Wegfahrsperren und Netzwerke ohne ausreichenden Schutz aufgespürt. Viele Fehler kommen Sicherheitsexperten bekannt vor – aus der Büro-IT vor 20 Jahren. Die Folgen können dramatisch sein. Der Fahrer verliert die Kontrolle über sein Gefährt. - Internationaler Flugverkehr gestört: Alaska-Vulkan speit spektakuläre Aschewolke – n-tv.de
Eine wichtige Flugroute zwischen Asien und Amerika muss weiträumig umflogen werden. Der Grund ist ein Vulkanausbruch. Der Feuerberg Pavlof speit eine bis zu 6000 Meter hohe Aschewolke in die Luft. - Dragonfly: Western Energy Companies Under Sabotage Threat | Symantec Connect Community
Cyberespionage campaign stole information from targets and had the capability to launch sabotage operations. - Umfrage des Weltenergierates: Cyberattacken bereiten Energiekonzernen Sorge
Die Energiewirtschaft fürchtet gezielte Attacken auf ihre IT-Systeme. Die Versorger müssten sich mit neuen Bedrohungsszenarien beschäftigen, sagte der Chef des Weltenergierates in Deutschland, Uwe Franke, WirtschaftsWoche online. - Business Continuity RPO and RTO: Why Should I Care?
Disaster recovery is pretty important, right? You need to be able to work at some point if your network goes down because of a major disaster, whether it’s a natural disaster or a result of some sort of network invasion or massive failure. While there are a lot of acronyms in the technology management industry, when it comes to disaster recovery and continuity, the most important two are RPO and RTO. - Wer sind die “interested parties” aus ISO 22301 – Business Continuity Management News
Wer sind die “interested parties” aus ISO 22301 - Rückrufaktion: VW ruft sämtliche Elektroautos in den USA zurück | ZEIT ONLINE
Rückrufaktion: VW ruft sämtliche Elektroautos in den USA zurück | ZEIT ONLINE Ein defekter Überlastungsschutz könnte laut VW zum Ausfall des Motors führen. Probleme in Deutschland sind wegen der unterschiedlichen Stromsysteme nicht zu befürchten. - FBI looks into MedStar computer virus – Business Insider
FBI looks into MedStar computer virus – Business Insider FBI looks into MedStar computer virus The FBI says it’s investigating a computer virus that has crippled information systems at the major Washington-area hospital chain MedStar Health Inc. - Cybersecurity Report – Threats and Opportunities – Business Insider
Cybersecurity Report – Threats and Opportunities – Business Insider Cybersecurity Report – Threats and Opportunities New hacking threats have emerged in the past two years, and with it has come an large increase in worldwide concern about cybersecurity. - Human-Caused Earthquakes Are So Common That US Geologists Had to Change Their Maps
Human-Caused Earthquakes Are So Common That US Geologists Had to Change Their Maps For the first time ever, the United States Geological Survey has published earthquake hazard maps that includes both human-induced as well as naturally occurring earthquakes. USGS maps had previously only featured natural earthquake hazards, but thanks to the alarming rise of man-made quakes, the scientific body has now started to track both kinds. - FBI wants U.S. businesses to help as cyber extortion gains urgency| Reuters
FBI wants U.S. businesses to help as cyber extortion gains urgency | Reuters The FBI is asking businesses and software security experts for emergency assistance in its investigation into a pernicious new type of “ransomware” virus used by hackers for extortion. - 1 million Gmail accounts victim of state-sponsored hackingSecurity Affairs
1 million Gmail accounts victim of state-sponsored hackingSecurity Affairs Google confirmed that one million Gmail accounts might have been targeted by nation-state hackers.
0 Responses