{"id":8432,"date":"2023-04-10T08:18:06","date_gmt":"2023-04-10T08:18:06","guid":{"rendered":"https:\/\/tecnologia.vamtam.com\/?p=8432"},"modified":"2024-04-10T12:24:41","modified_gmt":"2024-04-10T06:54:41","slug":"4-cybersecurity-takeaways-from-chinas-largest-data-breach","status":"publish","type":"post","link":"https:\/\/moboappsolutions.com\/index.php\/2023\/04\/10\/4-cybersecurity-takeaways-from-chinas-largest-data-breach\/","title":{"rendered":"4 Cybersecurity Takeaways from China\u2019s Largest Data Breach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8432\" class=\"elementor elementor-8432\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b695261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b695261\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57835e0b\" data-id=\"57835e0b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a940bd0 elementor-widget elementor-widget-text-editor\" data-id=\"5a940bd0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 20-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h2>Cybersecurity Takeaway #1 \u2013 Embrace a layered approach.<\/h2><p>Cybersecurity is a discipline that encompasses people, processes, and technology. While accidentally sharing your log-in credentials on a public technology forum, LinkedIn, Facebook, or Instagram is an open invitation for invasion; technical safeguards will save the day.<\/p><p>Even if a threat actor has a user ID and password, they will be stopped in their tracks if the potential victim is using\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/azure-active-directory-mfa-multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">Multi-Factor Authentication\u00a0<\/a>(MFA).<\/p><p>Here\u2019s a simple example: whenever I log into my personal Yahoo account through the\u00a0<a href=\"https:\/\/www.lastpass.com\/products\/business\" target=\"_blank\" rel=\"noopener\">LastPass<\/a>\u00a0portal, I receive a notification on my cellphone that requires me to verify I\u2019m the one logging in.<\/p><p>I push green for \u201cyes\u201d and red for \u201cno.\u201d Over the last five years, I\u2019ve received several notifications when I was not logging into Yahoo and quickly smashed the red button. MFA would have thwarted this attack.<\/p><p>\u00a0<\/p><h2>Cybersecurity Takeaway #2 \u2013 Cultivate a security-first culture.<\/h2><p>Social media, personal blogs, and other online forums create cybersecurity challenges because it\u2019s effortless for threat actors to use automated scraping tools to aggregate open source intelligence from these platforms.<\/p><p>Open source means the information is publicly available, so it\u2019s advisable to avoid oversharing. Criminal cartels take bits and pieces of your shares, comments, likes, pictures, and connections to plot data breaches, ransomware attacks, and political sabotage.<\/p><p>Rogue nation-states can even disable water supplies and entire power grids.<\/p><p>\u00a0<\/p><h2>Cybersecurity Takeaway #3 \u2013 Follow an established framework.<\/h2><p>When your managed IT services provider (MSP) or IT Director talk about cybersecurity, many C-Level executives think, \u201cOh boy, looks like we\u2019re adding another expense to our income statement.\u201d<\/p><p>While taking extra measures to strengthen cyber resilience carries a fee, if you align the endeavor with the cybersecurity framework for your business, the operating and marketing benefits will offset the investment.<\/p><p>We experienced this first-hand at\u00a0<a href=\"https:\/\/integrisit.com\/about\/credentials-certifications\/\">Integris<\/a>\u00a0when we adopted SOC 2 Type II compliance. This rigorous set of information security controls is expensive to maintain ($20K \u2013 $80K per year), and each audit spans 12 months.<\/p><p>However, fewer than 1% of MSPs (managed IT service providers) are SOC 2 Type II certified, so we stand out with prospects and clients who require extra assurance that their data is safe with us.<\/p><p>Therefore, this exhaustive compliance standard and related audit reports are worth their weight in gold. We also use the framework to justify any new cybersecurity tools we buy.<\/p><p>\u00a0<\/p><h2>Cybersecurity Takeaway #4 \u2013 Avoid fools with tools syndrome.<\/h2><p>We didn\u2019t invent the term \u201cfools with tools.\u201d Still, it\u2019s a perfect definition for the practice of buying a stack of sophisticated cybersecurity technology that\u2019s impossible to manage without an MSP or the budget of a Fortune 500 IT department.<\/p><p>Even Fortune 500 IT departments outsource cybersecurity solutions to MSPs because hiring specialists with continuously updated solution certifications is more cost-effective.<\/p><p>For example, Managed Detection &amp; Response (MDR) is an advanced cybersecurity solution that delivers tremendous benefits. However, DIY implementations rarely meet expectations.\u00a0<a href=\"https:\/\/www.securitymagazine.com\/articles\/94980-taking-a-diy-approach-to-cybersecurity-is-a-dangerous-proposition\" target=\"_blank\" rel=\"noopener\">Security Magazine<\/a>\u00a0advises outsourcing MDR for the following reasons:<\/p><ul><li>A 24x7x365 SOC is complicated because it requires tools, monitors, software, systems, network appliances, and sensors.<\/li><li>You must acquire, integrate, and manage all third-party services and licenses.<\/li><li>The SOC must have the necessary resources to evaluate and integrate new technologies.<\/li><li>It must also evolve to keep pace with cyber threats\u2019 ever-increasing volume and complexity.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bfc6f18 elementor-widget elementor-widget-image\" data-id=\"2bfc6f18\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 20-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1686\" height=\"941\" src=\"https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-8538\" alt=\"\" srcset=\"https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646.jpg 1686w, https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646-300x167.jpg 300w, https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646-1024x572.jpg 1024w, https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646-768x429.jpg 768w, https:\/\/moboappsolutions.com\/wp-content\/uploads\/2023\/04\/pexels-proxyclick-visitor-management-system-2451646-1536x857.jpg 1536w\" sizes=\"(max-width: 1686px) 100vw, 1686px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33c47749 elementor-widget elementor-widget-heading\" data-id=\"33c47749\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 20-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity ecosystem<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77d197e9 elementor-widget elementor-widget-text-editor\" data-id=\"77d197e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The Data Security Council of India has forecast that the cybersecurity ecosystem will expand up to a point where nearly one million professionals will be required by 2025. Additionally, the demand for cloud security skills is estimated to grow by 115% between 2020 and 2025, representing almost 20,000 job openings, Narayan added.<\/p><p>An extensive exercise in reskilling and\/or upskilling the existing workforce, believe staffing experts, is one of the ways that telcos can future proof their work.<\/p><p>Indian mobile phone operators are expected to at least double their investments on network security with the 5G roll out expected to spark a surge in network vulnerabilities, which assume critical importance especially for enterprises.<\/p><p>However, it is already proving to be a challenge for telcos to have robust security teams.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434e36dd elementor-blockquote--skin-clean elementor-blockquote--align-center elementor-blockquote--button-view-icon elementor-blockquote--button-skin-link elementor-widget-mobile__width-inherit elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"434e36dd\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.11.6 - 14-03-2023 *\/\n@charset \"UTF-8\";.entry-content blockquote.elementor-blockquote:not(.alignright):not(.alignleft),.entry-summary blockquote.elementor-blockquote{margin-right:0;margin-left:0}.elementor-widget-blockquote blockquote{margin:0;padding:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;quotes:none;border:0;font-style:normal;color:#55595c}.elementor-widget-blockquote blockquote .e-q-footer:after,.elementor-widget-blockquote blockquote .e-q-footer:before,.elementor-widget-blockquote blockquote:after,.elementor-widget-blockquote blockquote:before,.elementor-widget-blockquote blockquote cite:after,.elementor-widget-blockquote blockquote cite:before{content:none}.elementor-blockquote{transition:.3s}.elementor-blockquote__author,.elementor-blockquote__content{margin-bottom:0;font-style:normal}.elementor-blockquote__author{font-weight:700}.elementor-blockquote .e-q-footer{margin-top:12px;display:flex;justify-content:space-between}.elementor-blockquote__tweet-button{display:flex;transition:.3s;color:#1da1f2;align-self:flex-end;line-height:1;position:relative;width:-moz-max-content;width:max-content}.elementor-blockquote__tweet-button:hover{color:#0967a0}.elementor-blockquote__tweet-button span{font-weight:600}.elementor-blockquote__tweet-button i,.elementor-blockquote__tweet-button span{vertical-align:middle}.elementor-blockquote__tweet-button i+span,.elementor-blockquote__tweet-button svg+span{margin-left:.5em}.elementor-blockquote__tweet-button svg{fill:#1da1f2;height:1em;width:1em}.elementor-blockquote__tweet-label{white-space:pre-wrap}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button{padding:.7em 1.2em;border-radius:100em;background-color:#1da1f2;color:#fff;font-size:15px}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover{background-color:#0967a0;color:#fff}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover:before,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button svg,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button svg{fill:#fff;height:1em;width:1em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button{padding:0;width:2em;height:2em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i{position:absolute;left:50%;top:50%;transform:translate(-50%,-50%)}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:before{content:\"\";border:.5em solid transparent;border-right-color:#1da1f2;position:absolute;left:-.8em;top:50%;transform:translateY(-50%) scaleY(.65);transition:.3s}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:before{right:auto;left:-.8em;border-right-color:#1da1f2;border-left-color:transparent}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:before{left:auto;right:-.8em;border-right-color:transparent;border-left-color:#1da1f2}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:hover:before{border-left-color:#0967a0}.elementor-blockquote--skin-boxed .elementor-blockquote{background-color:#e6e9ec;padding:30px}.elementor-blockquote--skin-border .elementor-blockquote{border-color:#e6e9ec;border-left:7px #e6e9ec;border-style:solid;padding-left:20px}.elementor-blockquote--skin-quotation .elementor-blockquote:before{content:\"\u201c\";font-size:100px;color:#e6e9ec;font-family:Times New Roman,Times,serif;font-weight:900;line-height:1;display:block;height:.6em}.elementor-blockquote--skin-quotation .elementor-blockquote__content{margin-top:15px}.elementor-blockquote--align-left .elementor-blockquote__content{text-align:left}.elementor-blockquote--align-left .elementor-blockquote .e-q-footer{flex-direction:row}.elementor-blockquote--align-right .elementor-blockquote__content{text-align:right}.elementor-blockquote--align-right .elementor-blockquote .e-q-footer{flex-direction:row-reverse}.elementor-blockquote--align-center .elementor-blockquote{text-align:center}.elementor-blockquote--align-center .elementor-blockquote .e-q-footer,.elementor-blockquote--align-center .elementor-blockquote__author{display:block}.elementor-blockquote--align-center .elementor-blockquote__tweet-button{margin-right:auto;margin-left:auto}<\/style>\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cEven if we do not talk about 5G (specifically), the security talent in general in the country is very sparse at the moment. We need to get more (security) professionals in the system\u201d\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CEven+if+we+do+not+talk+about+5G+%28specifically%29%2C+the+security+talent+in+general+in+the+country+is+very+sparse+at+the+moment.+We+need+to+get+more+%28security%29+professionals+in+the+system%E2%80%9D&amp;url=https%3A%2F%2Fmoboappsolutions.com%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F8432\" class=\"elementor-blockquote__tweet-button\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Tweet<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cef000a elementor-widget elementor-widget-text-editor\" data-id=\"5cef000a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Bharti Airtel, for example, has been preparing for 5G roll out by upskilling its professionals and offering them certification courses such as CCNA (Cisco Certified Network Associate) and CCNP (Cisco Certified Network Professional). The courses are offered based on skill and eligibility level free of cost.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity drama strikes again as human error leads to China\u2019s biggest data breach and perhaps the most significant hack of personal information in history.<\/p>\n","protected":false},"author":1,"featured_media":8433,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[25,29],"_links":{"self":[{"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/8432"}],"collection":[{"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=8432"}],"version-history":[{"count":3,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/8432\/revisions"}],"predecessor-version":[{"id":988065,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/8432\/revisions\/988065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/8433"}],"wp:attachment":[{"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=8432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=8432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moboappsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=8432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}