<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Verizon &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/verizon/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 01 Sep 2020 13:37:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Verizon &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Good news about data breaches</title>
		<link>https://risk-academy.ru/good-news-about-data-breaches/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 17:48:01 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Protiviti]]></category>
		<category><![CDATA[destination bank]]></category>
		<category><![CDATA[USEF]]></category>
		<category><![CDATA[Data breach]]></category>
		<category><![CDATA[Internal audit]]></category>
		<category><![CDATA[Service industries]]></category>
		<category><![CDATA[Service companies]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Verizon]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/good-news-about-data-breaches/</guid>

					<description><![CDATA[Protiviti has shared a useful summary of the latest Verizon Data Breach Investigations Report (DBIR), which is available from Verizon here. The good news was put well by Protiviti: One [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Protiviti has shared a useful summary of the latest Verizon Data Breach Investigations Report (DBIR), which is available from Verizon here.</p>
<p>The good news was put well by Protiviti:</p>
<blockquote>
<p>One of the surprises in this year’s report is that organizations are discovering 60 percent of data breaches in days or less and containing 80 percent of breaches in the same timeframe.</p>
</blockquote>
<p>As Protiviti says:</p>
<blockquote>
<p>Verizon highlights that this is due to more breaches being detected by managed security providers, and not necessarily an improvement of internal detection and containment capabilities.</p>
</blockquote>
<p>The Verizon report has a wealth of detail but it is awkward to navigate. So I suggest reading the Protiviti summary first.</p>
<p>One of the Verizon points which is of tremendous importance, although it is hidden in the middle of the Results and Analysis section[1], is this:</p>
<blockquote>
<p>Last year, we looked at the median impact cost for incidents reported to the FBI IC3. With regard to business email compromises (BEC), we noticed that most companies either lost $1,240 or $44,000 with the latter being slightly more frequent (Figure 32).</p>
<p>Also, last year we stated that when “the IC3 Recovery Asset Team acts upon BECs, and works with the destination bank, half of all U.S.-based business email compromise victims had 99% of the money recovered or frozen; and&#8230;</p>
</blockquote>
</div>
<p><a href="https://normanmarks.wordpress.com/2020/08/30/good-news-about-data-breaches/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pandemic highlights need for cyber risk management in SMEs</title>
		<link>https://risk-academy.ru/pandemic-highlights-need-for-cyber-risk-management-in-smes/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 08:15:57 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Douw Gerber]]></category>
		<category><![CDATA[media statement]]></category>
		<category><![CDATA[South Africa]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[cyber risk management]]></category>
		<category><![CDATA[security tools]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Business Development Manager]]></category>
		<category><![CDATA[Manager at leading South]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/pandemic-highlights-need-for-cyber-risk-management-in-smes/</guid>

					<description><![CDATA[/ MEDIA STATEMENT / This content is not written by Creamer Media, but is a supplied media statement. If small and medium businesses had little appetite for cyber risk management [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article_content_container">
<p><strong>/ MEDIA STATEMENT /</strong> <span class="announcement-disclaimer">This content is not written by Creamer Media, but is a supplied media statement.</span></p>
<p>If small and medium businesses had little appetite for cyber risk management before the Coronavirus pandemic, they may have developed one now. Mobilising remote workforces, provisioning the right set of tools, managing the flow of data, keeping it secure and controlling who has access to what has likely to have caused disruptions and headaches at best. At worst, lack of cyber risk management has caused companies to grind to a complete halt.</p>
<p>Douw Gerber, Business Development Manager at leading South Africa-based managed IT security services company, Securicom, says that lack of cyber risk management is a factor in the higher incidence of cyber related fraud amongst small businesses during the lockdown. Citing Verizon’s Business 2020 Data Breach Investigations Report, he says that about a third (28%) of data breaches this year has involved small businesses.</p>
<p>“There are no controls in place to manage access to and the share of information. Backs ups don’t happen when they should. Cyber security tools aren’t updated as they should be. Employees are using unsecured devices&#8230;</p>
</div>
<p><a href="https://m.engineeringnews.co.za/article/pandemic-highlights-need-for-cyber-risk-management-in-smes-2020-08-26">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding data breaches 2020 &#124; Norman Marks on Governance, Risk Management, and Audit</title>
		<link>https://risk-academy.ru/understanding-data-breaches-2020-norman-marks-on-governance-risk-management-and-audit/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 20:31:58 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[Accounting]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[bank accounts]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Auditing]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Corporate governance]]></category>
		<category><![CDATA[SMS]]></category>
		<category><![CDATA[Verizon]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/understanding-data-breaches-2020-norman-marks-on-governance-risk-management-and-audit/</guid>

					<description><![CDATA[Home &#62; Risk &#62; Understanding data breaches 2020 Understanding data breaches 2020 For 13 years, Verizon has shared their Data Breach Investigations Report. The 2020 edition is now available. As usual, it [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="postpath">
		Home<br />
		 &gt; Risk		 &gt; Understanding data breaches 2020	</div>
<div id="post-2813">
<h2>Understanding data breaches 2020</h2>
<div class="content">
<p>For 13 years, Verizon has shared their Data Breach Investigations Report. The 2020 edition is now available.</p>
<p>As usual, it contains some interesting information:</p>
<ul>
<li>Only 70% of breaches were by external actors.</li>
<li>Organized crime was behind 55%.</li>
<li>Nation states, sysadmins, and end users were each behind about 10% of the breaches.</li>
<li>22% included social attacks (pretexting and phishing), 96% of the time by email. 1% by phone or SMS.</li>
<li>17% involved malware; 27% of malware was ransomware.</li>
<li>8% was from misuse by authorized users.</li>
<li>Partners were involved in 1%; multiple parties were also involved in 1%.</li>
<li>81% were contained in one day or less [a massive improvement from what I have read in the past].</li>
<li>72% of the victims were large businesses.</li>
<li>58% of victims had personal data compromised.</li>
<li>20% of breaches take months to be discovered, a significant improvement from prior years</li>
<li>Of the 108,069 breaches and 157,525 incidents reported to Verizon, more than 100,000 breaches “were credentials of individual users being compromised to target bank accounts, cloud services, etc.”</li>
<li>There were 25,029 incidents involving organizations where they could identify the industry category. 7,463 (30%) involved professional organizations, 6,843 (27%) were&#8230;</li>
</ul>
</div>
</div>
<p><a href="https://normanmarks.wordpress.com/2020/07/01/understanding-data-breaches-2020/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Five cyber-security lessons from the pandemic &#124; Article</title>
		<link>https://risk-academy.ru/five-cyber-security-lessons-from-the-pandemic-article/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 15:34:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[online meetings]]></category>
		<category><![CDATA[official communications]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[virtual private network]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[business travel]]></category>
		<category><![CDATA[Secure collaboration tools]]></category>
		<category><![CDATA[wireless printers]]></category>
		<category><![CDATA[similar technologies]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/five-cyber-security-lessons-from-the-pandemic-article/</guid>

					<description><![CDATA[1. Don’t take the bait Phishing remains a popular—and effective—technique for attackers. It is an attempt to steal credentials and obtain sensitive information, often by an e-mail message containing a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<h4 id="Dont_take_the_bait"><strong>1. Don’t take the bait</strong></h4>
<p>Phishing remains a popular—and effective—technique for attackers. It is an attempt to steal credentials and obtain sensitive information, often by an e-mail message containing a link to a seemingly legitimate Website. Phishing is the top threat action used in cyber-security breaches, according to Verizon’s 2020 Data Breach Investigations Report. To combat phishing, employees should know how official communications will be sent, treat unknown e-mails and links as suspicious, and have an easy way to alert their IT security team.</p>
<h4 id="Improve_cybersecurity_training"><strong>2. Improve cyber-security training</strong></h4>
<p>Most cyber-security training revolves around workplace use, with passing mention of security best practices while on business travel. Remote work opens the door to risks posed by unknown Wi-Fi networks, shared workspaces, wireless printers, and similar technologies not vetted by IT security. Cyber-security training should include best practices for remote work, covering: working environment, router security, use of a virtual private network (VPN), oversharing screens during online meetings, personal use of company computers, and IT support.</p>
<h4 id="Secure_collaboration_tools"><strong>3. Secure collaboration tools</strong></h4>
<p>Collaboration tools,&#8230;</p>
</div>
<p><a href="https://www.complianceweek.com/cyber-security/five-cyber-security-lessons-from-the-pandemic/29066.article">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>These are the top 5 must-read cybersecurity books</title>
		<link>https://risk-academy.ru/these-are-the-top-5-must-read-cybersecurity-books/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 23 May 2020 19:30:20 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Personal life]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Human behavior]]></category>
		<category><![CDATA[Marcus Carey]]></category>
		<category><![CDATA[Timothy Ferriss]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Jennifer Jin]]></category>
		<category><![CDATA[Hackers: Heroes of the Computer Revolution]]></category>
		<category><![CDATA[Hacker culture]]></category>
		<category><![CDATA[Security hacker]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/these-are-the-top-5-must-read-cybersecurity-books/</guid>

					<description><![CDATA[Hackers and cyber-criminals improve their tactics every day. As a consequence, the cybersecurity industry must perpetually adapt to stay ahead of malicious actors. Verizon points out in its 2019 Data [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-body">
<p>Hackers and cyber-criminals improve their tactics every day. As a consequence, the cybersecurity industry must perpetually adapt to stay ahead of malicious actors. Verizon points out in its <u>2019 Data Breach Investigations Report</u>, which is based on 42,000 recorded incidents, that the best defense against cybercrime is knowledge. Unless organizations understand the digital threats they face, they will be powerless to stop them. </p>
<p>Whether you are simply reading for pleasure or hoping to protect yourself by improving your cybersecurity knowledge, there’s no better place to turn to understand the nuances of information security than a good book. </p>
<aside class="hawk-widget" data-render-type="fte" data-skip="dealsy" data-widget-type="seasonal"/>
<p>To help you find the most informative, engaging, and up-to-date works published on cybersecurity, we put together the list below. These are the top 5 must-read cybersecurity books to pick up in 2020.</p>
<h2 id="1-tribe-of-hackers-cybersecurity-advice-from-the-best-hackers-in-the-world-xa0">1. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World </h2>
<figure data-bordeaux-image-check="">
<p class="vanilla-image-block"><picture><source type="image/webp" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg.webp 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg.webp 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg.webp 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/><source type="image/jpeg" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/><img decoding="async" title="Articles" src="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/></picture><figcaption itemprop="caption description"><span class="caption-text">T<em>ribe of Hackers will address any misconceptions you hold about cybersecurity. </em> </span><span class="credit" itemprop="copyrightHolder">(Image credit: Future)</span></figcaption></figure>
<p>Marcus Carey was inspired to write <em>Tribe of Hackers</em> after listening to Timothy Ferriss’s <em>Tribe of Mentors</em>. He and Jennifer Jin put together 14 questions, starting&#8230;</p>
</div>
<p><a href="https://www.techradar.com/in/news/these-are-the-top-5-must-read-cybersecurity-books">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
