Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019 cybersecurity predictions, and more.
Legal fallout has begun from the massive Starwood Hotels reservation breach reported last week, with class-action suits filed on behalf of guests and investors. Here’s what to expect.
Will 2019 be the year of protected privacy? According to Chris Babel, CEO of TrustArc, “Managing privacy will be the new normal, like securing data or paying taxes. Privacy will continue on a similar path as the evolution of cybersecurity. The number of breaches and privacy-related incidents will continue to rise, up and to the right. … Like with security, a standard of constant privacy will become the new normal.”
As attacks become more sophisticated and business leaders continue to champion digital transformation, an organization’s success depends on a well-equipped security team. These trends have driven a shift in the skills and abilities that CISOs and other executives seek when hiring security talent.
According to a CA report, over 50 percent of organizations suffered an insider threat-based attack in the previous 12 months, while one-quarter say they are suffering attacks more frequently than in the previous year. And according to Ponemon, a successful, malicious insider attack can cost companies an average of $600,000.
Here, CSO Online outlines the seven warning signs of an insider threat that all security-minded professionals must keep an eye on.
According to SailPoint’s 2018 Market Pulse Survey, employees see IT as an “inconvenience,” and often search for ways to get around security measures. As a result, Shadow IT has exploded, with 31 percent — 11 percent more than four years ago – say they or one of their colleagues have purchased and/or deployed software without IT’s help. But IT can’t make the organization secure if the user is working in the exact opposite direction.
AppExchange vendors are thoroughly vetted, which means you can trust these partners to enhance your Salesforce investment without compromising your security. Nonetheless, connecting external tools to your Salesforce instance can present a challenge to Salesforce Admins: How do you ensure all your integrations are stable, auditable, and secure?
A dedicated integration user can be a great way to address this challenge, helping you manage integrations more seamlessly while increasing your productivity and saving you time. Here’s how.
Security professionals, now more than ever, understand that individuals play a huge role in protecting the organization’s information at large. With more and more initiatives focused on the “human factor” or “human firewall,” it’s important to remember that end users can be leveraged as a protective measure, rather than a liability or vulnerability.
Here, you’ll find several best practices from leading organizations, government researchers, and academics, which can be applied to help you develop a more security-positive culture.