Mobile-based apps, telematics and the Internet of Things, among others, are all technological advancements that have delivered great convenience to us as consumers. The in-car information systems serve as excellent tools for communication, vehicle tracking, maintenance and servicing. For the individuals, the connectivity they offer make them exceptional entertainment, mobility and physical security instruments. But like with all technologies, in the wrong hands, these tools have a dark side. Increasingly, these technologies are being mis-used by threat actors and so posing a significant risk to individual and organisations’ data privacy.
Fundamentally, records management is about information governance, which in turn – given all the regulatory scrutiny that exists today – is key to minimising operational risk. Due to the continuous and exponential growth of data in a variety of formats, a manual approach to records management is likely to be a losing battle. On the other hand, a strategic, in-place and automated approach can make this function routine and ‘par for the cause’.
The Ascertus Security Thought Leadership Series
Cyber Security Help is at Hand!
In this Ascertus blog series, several cyber security issues have been addressed including insider threat, ransomware, phishing and supply chain risk. Clearly, there’s a human impact emanating from cybercrime, which has been well-articulated in this series too.
Technological advancements have made a profound impact in all aspect of our lives. And as a result, many businesses are pushing forward with their digital agendas.
Digitisation has made its way into the legal system, too. The UK government published its policy paper in 2017, setting out how to develop a world-leading digital economy that works for everyone. For both the government and law firms, this change is mostly driven by client pressure, according to The Law Society.
Generally, pessimism is not something I’d encourage. In many of life’s challenges, optimism can make it easier to cope and influence the outcome for the better. And, let’s face it, no one likes the person who, in every meeting, brings the mood down with a healthy serving of negativity.
Ben Mitchell, VP Global Commercial Operations at DocsCorp, advocates for a ‘glass half empty’ approach to data security and protection.
We all know the importance of good personal health, right? For instance, weight loss reduces the risk of heart disease, blood pressure and diabetes, and can extend an individual’s lifespan. But we still eat burgers and fatty foods – perhaps until something drastic happens to our health, which is when we act. Similarly, smoking significantly increases the risk of lung cancer and a variety of pulmonary diseases, but that doesn’t stop us from partaking in this activity. Our rationale? If we were to acknowledge every single negative or risk, life wouldn’t be worth living. Perhaps! Also, we don’t see the value of pre-empting such health scares – the benefits of good health are intangible – until ill health strikes.
Supply chain risk management is not a new concept; but in recent times the issue has come to the fore, primarily driven by cyber security, but also regulatory compliance. Like for many other types of risk (e.g. financial, operational), it’s important for organisations to build in resilience against supply chain risk too, given its the potential to disrupt business operation.
Increasingly, corporate legal departments are deploying document and email management systems. This technology has become essential for lawyers’ day today activities. Simultaneously, lawyers are recognising the need for better collaboration, both internally and with outside legal counsel, as well as the ability to reuse and re purpose information. They don’t want to unnecessarily ‘reinvent the wheel’, which often comes at the cost of productivity and efficiency.
The Ascertus Security Thought Leadership Series
Supply Chain Risk Comes from Software and Physical Service Providers
Supplier risk is a growing concern today and organisations need to look at third party risk more comprehensively. Regardless of in which organisation the breach occurs, the reputational damage is borne by the firm that holds the data. Ticket Master is a case in point. The breach was caused by malware that infected a customer support system managed by Ticketmaster’s partner Inbenta Technologies, on the company’s behalf.
Phishing attacks as we know, are malicious and orchestrated by external parties. Often due to their sophistication, despite the best efforts on the part of employees, criminals manage to trick them into giving access to business-critical and/or sensitive information. Therefore, the importance of continuous staff awareness and training cannot be emphasised enough.