In the “build” phase, they need to implement core privacy management program capabilities, including data discovery and enrichment efforts to create and maintain privacy risk registers. In the “sustain” phase, organizations should scale the program, focusing on ongoing administration and resource management. incident response to address personal data breaches, as well as automation. Finally, the “evolve” phase includes specific tools aimed at reducing privacy risk without compromising the overall meaning of the data, which is critical for, for example, corporate marketing teams.
Security Tales: Tech Support Call
Vladimir Bezmaly | 09.21.2020
So the summer is over... And although September was warm, you could still feel autumn at night. More and more often the mornings were quite cold, although sunny. But during the day it was still summer-hot. Potapych loved this time of year. There were plenty of fruits, vegetables, the evenings were still long. In short, I don't want to rest. Everything would have been fine, but the coronavirus... People had to switch to remote work. This affected everyone. Both technical support staff and information security staff.
Potypych's thoughts were interrupted by the ringing telephone.
- Hello, Potapych!
- Hello, Maria! What happened?
— Yes, my call is strange. I just got a call from a argentina mobile database who introduced himself as a technical support employee of our company and said that an attack on my computer was registered and now I need to provide a login and password or open remote access to the device for an investigation. But how do I know that it is a support or information security employee calling? How can I confirm that it is not a phisher, a fraudster or some other cybercriminal?
— Yes... You ask good questions. Smart ones. The simplest option: you just ask for his extension number. And then you call back to your office landline, dialing the employee's extension number. If the same person picks up the phone, everything is fine. Here's your "friend or foe" authentication. And you don't need to come up with anything technically complicated.
This could include strengthening
-
- Posts: 730
- Joined: Mon Dec 23, 2024 3:13 am