Cybersecurity worm hole
A vulnerability is a weakness which allows a cyber attacker to compromise a computer system’s information assurance.
As you can imagine, a vulnerability left alone can take a production system down to its knees causing a company millions upon millions of dollars. The sooner we, as a company know, about vulnerabilities that can affect our company the better. It allows software manufacturers to develop and deploy patches quicker.
Legislation last week was announced last week by a joint House and Senate Democrats and Republicans that seems to be the first response to the “ransomware” outbreak that occurred globally. It is believed that attack was initiated by a National Security Agency (NSA) hacking tool. The bill, referred to as the “PATCH Act” makes permanent the current Vulnerabilities Equities Process that discloses when the government tells us about software vulnerabilities.
Senators Brian Schatz (D-HI), Ron Johnson (R-WI) and Cory Gardner (R-CO) as well as Representatives Ted Lieu (D-CA) and Blake Farenthold (R-TX), introduced the Protecting Our Ability to Counter Hacking (“PATCH”) Act.
Currently, not all vulnerabilities are shared with the Vulnerabilities Equities Process, and certain vulnerabilities are guarded.
The following statement can be attributed to Andi Wilson, Policy Analyst at New America’s Open Technology Institute:
“One of the most critical components of a strong vulnerabilities review process is that it apply to absolutely all vulnerabilities in the government’s possession, not just the ones that the intelligence community chooses to put into the process. The PATCH Act presents an opportunity to make vulnerabilities review consistent and transparent, assuring government stakeholders, companies, and the American people that a clear set of rules is being used to decide whether vulnerabilities should be disclosed. Given the very real cybersecurity concerns of nondisclosure, it is imperative that steps be taken to improve the process for vulnerabilities review, and legislation like the PATCH Act is crucial in establishing confidence and trust in that process. OTI strongly supports the PATCH Act sponsors’ efforts to address the cybersecurity risk posed by government-stockpiled vulnerabilities, and thanks Senators Schatz and Johnson for their leadership on this issue.”
Cyber-attacks continue to be a significant threat to companies. It is nice to know the House and Senate are becoming aware.
Cyber Security is currently a real need. Businesses of all kinds involve sensitive information especially those of customers. As information is usually gained from cyberspace, businesses are not really safe. If the information gets into the wrong hands, the cyber breach could cause catastrophic damage. Also, one small cyber breach on an Industrial Automation facility and production grinds to a halt.
Businesses lose thousands, if not millions of dollars when production stops.
In the last two years the rate of cyber crime has exceeded, and in 2015 alone, there were about 781 publicized security breaches that resulted in the exposure of over 169 million personal records.
Sadly, this number is increasing one year after another.
Such kind of attacks take place when there is a loophole in the techniques and measures adopted for cyber security. Big names like Target, Harvard, and BlueCross have also been a victim of cyber attacks which is proof that none of the big businesses are safe from this threat of getting attacked through cyber.
Over the last 2-3 years, the rate of cyber attack and cyber criminals are getting faster and better at figuring out the wormholes, and sadly this has made it difficult for the businesses to keep up. The conventional protective software has trouble keeping sensitive data secure.
So what to do? IT executives have come up with some innovative strategies that involve automation as a defense tool against such kind of cyber attack and breach of cyber security. Nowadays, the threats have increased, and the IT people are up against constant and persistent attacks and these threats are led by automated bots.
These are intensive attacks and humans cannot keep pace with some such threats, and it becomes difficult to take decisions that trigger the immediate effect. This is the leading cause of automation being incorporated in cyber security. Automation is not powerful but efficient as well.
At the same time, some concerns also surround the aspect of automation in cyber security like:
Lack of Trust: A highly skilled employee would feel capable of giving a response to cyber attack compared to a machine. Not being able to trust technology tends to be a significant obstacle that is difficult to handle with an increase in frequency and complexity.
Change: Another misconception is automation shall replace human workforce. Automation does play a major role in changing how people worked before, but it is creating opportunities for them as well.
To address these perceived shortcomings, there are some significant advantages:
Enhanced Efficiency: With the help of automation, the workflows become more uniformed and streamlined. And the organization becomes stronger regarding cyber security.
Fewer Errors: Majority of the renowned cyber breaches were caused by highly overworked individuals with no harmful intention. Even the experts of IT can make mistakes, but these could be massively damaging with automation, this problem can be eliminated by eradicating some or all of the human involvement.
Better Decisions: Automation allows industries to gather, analyze and prioritize sensitive information that boosts the threat detection and cyber attack management process.
Cyber Security should be the top-most priority of every business/industry leader as the average cost of a cyber attack ranges from $38,000 to staggering $400 billion!
The strategies need to be revised and audited properly to check their efficiency if the business is to keep from becoming the next target.
Automation is rising as an excellent tool for strengthening, boosting and streamlining the response processes to a better defense can be created.
#cybersecurity #security #privacy #tech #hacking #infosec #iot #DDoS #cyber
Control System Integrators Association (CSIA) Executive Conference
Linda Rawson, President, and CEO of DynaGrace Enterprises – an 8(a), WOSB, Information Technology and System Integration Company, attended the Control System Integrators Association (CSIA) Conference. CSIA’s Annual Executive Conference is an annual conference where over 500 hundred members and industry partners gather to network, hear outstanding speakers, share best practices, and learn about new products and services.
CSIA – Control System Integrators Association
2017 is the first year that DynaGrace Enterprises has attended the prestigious annual conference which changes locations every year. The location of this year’s conference was the Fort Lauderdale Marriott Harbor Beach Resort and Spa located in Fort Lauderdale, Florida. DynaGrace Enterprises’s President and CEO, Linda Rawson completed the two-day Best Practices Training and then attended the three-day conference as part of her commitment to strengthening DynaGrace Enterprise’s operations and growth opportunity.
Control system integrators design, build and implement efficient manufacturing, process, and industrial systems for manufacturing, process, and other industrial facilities to automate tasks and increase efficiency. The Control System Integrators Association (CSIA), founded in 1994, is a not-for-profit, global trade association. The mission of CSIA, according to the website, controlsys.org, is: “The mission of the Control System Integrators Association is to advance the industry of control system integration.” By following sound business practices identified by CSIA, members improve their business processes and profit while enjoying an opportunity to share industry expertise and lessons learned with their peers. CSIA has over 500 member companies in 27 countries.
“It is a great privilege to attend the conference and experience firsthand the information shared by top influences in the System Integrator market,” stated Linda Rawson, President, and CEO of DynaGrace Enterprises. “DynaGrace Enterprises has been heavily involved in Department of Defense work and is moving full forward in a growth opportunity in System Integration. The CSIA executive conference has provided additional insight and connections needed to enhance this growth opportunity while staying true to our core of providing exceptional personalized service to each of our valued clients.”
One of the highlights of CSIA is the certification program. Certified companies experience growth by establishing known business practices that are audited and verified. The certification lasts three years and provides a method for manufacturers to work with only certified businesses.
Many participants also report launching new products or services, discontinuing ineffective ones and expanding into new markets. They also report changes in the way they attract, manage and retain employees. Many alliances and partnerships are established at the annual conference as well as establishing a great business model.
The attendance at the conference follows shortly after another significant milestone from DynaGrace Enterprises — the development of strategic partnerships in the area of Human Machine Interface (HMI). DynaGrace Enterprises hopes to lead the field in integrating Virtual Reality into System Integration of Automation Solutions. This integration further supports DynaGrace Enterprises’s path of continued growth, maintaining itself as a provider of Information Technology services.
Customers can learn more about DynaGrace Enterprises by visiting the company’s website at DynaGrace.com or by calling the company directly at 800-676-0058.