Beneath the Surface of a Cyberattack: A Deeper Look at
Business Impacts
Deloitte identifies 14 business impacts of a
Cyberattack...
… “Beneath the
surface of a cyberattack” was created by Deloitte Advisory’s Cyber Risk
practice in tandem with the organization’s leading forensic and investigations,
and business valuation services. Looking
at two samples cyberattack scenarios, the report demonstrates a model to
quantify potential damage, and identifies 14 business impacts of a cyber
incident as they play out over a five-year incident response process. The scenarios illustrate some of the many ways
a cyberattack can unfold and both clearly illustrate that the road to business
recovery can be far more drawn out, more complex, and more costly than
imagined.
Above the surface: well-known
cyber incident costs
- Customer breach notifications
- Post-breach customer protection
- Regulatory compliance (fines)
- Public relations/crisis communications
- Attorney fees and litigation
- Cybersecurity improvements
- Technical investigations
Below the surface: hidden or less
visible costs
- Insurance premium increases
- Increased cost to raise debt
- Operational disruption or destruction
- Lost value of customer relationships
- Value of lost contract revenue
- Devaluation of trade name
- Loss of intellectual property (IP)
This assumes that criminals will cooperate?
Thailand to make tourists use traceable SIM cards
Foreign tourists in Thailand will be required to use a
special SIM card for their mobile phones that could be used to track their
movements during their stay, the telecom regulator said on Tuesday.
This SIM card has been specially programmed to transmit information
about its whereabouts once it is inserted in the phone. This function cannot be turned off when the
SIM is in use.
All foreigners in Thailand, excluding expats with
permanent addresses, will be required to purchase the special card, Thakorn
Tantasith, secretary general of the National Broadcasting and Telecommunication
Commission said.
"It
will benefit the government authority by being able to trace the location of
tourists who have illegally extended their stays or criminals who have fled to
Thailand to escape," he said. It will also be easier to track tourists who
stay in multiple locations during their stay, he added.
But in order to obtain the tourists' locations, police and
any authority will need a court order. If
a telecom operator reveals information without a court order, its officials
will be penalized with a five-year jail term. "If
the tourist has not done anything wrong, there's nothing to worry about to
begin with," Thakorn said.
How brotherly, how Big, Big Brotherly.
Joe Cadillic writes:
DHS’s Hometown Security Initiative (HSI)
encourages businesses to spy on Americans.
DHS admits to working closely with the private sector.
I’ll let you read the rest on Joe’s
newly redesigned blog, but want to highlight something he wrote:
Businesses and landlords
are doing there part to keep Americans in fear. DHS and the
FBI survive on fear, their budgets depend on Americans being
suspicious of everyone and everything. Where
does the lunacy end?
(Related) Are Apps like this useful without violating privacy?
You Can Help Fight Human Trafficking With This App
While much of it may be dedicated to cat videos and
trolling, there is no doubting the internet’s positive and collective power. TraffickCam takes all of these
elements and puts it toward an important cause: using the power of crowdsourcing to
fight human trafficking.
So how does it work?
Accessible on the go with iOS and Android apps or through its website,
TraffickCam is calling on travelers to upload photos of your hotel rooms. Whenever you travel, by taking up to four
photos of the room you’re staying in, you are
contributing to a database that will help in the prosecution of
human traffickers.
Interesting. Still
not the same as the Kim Dotcom case.
Last December a Virginia federal jury ruled that Internet
provider Cox Communications was responsible for the copyright infringements of
its subscribers.
The ISP was found guilty of willful contributory copyright
infringement and ordered to pay music publisher BMG Rights Management $25
million in damages.
The verdict was a massive victory for the music licensing
company and nothing short of a disaster for Cox.
… In the verdict,
the court upholds the conclusions of the jury. Among other things, it rules that there is
sufficient evidence for a jury to conclude that Cox is responsible for the
infringements that occurred on its network.
The fact that the ISP chose not to forward BMG’s notices
and settlement requests to its customers to protect them from extortion-like practices,
doesn’t change this.
“Whether or not Cox’s effort to protect its customers from
Rightscorp was noble or well-intentioned, Cox could not also turn a blind eye
to specific infringement occurring on its network,” Judge O’Grady writes.
For my Data Management students. Deliberate rounding error and failure to
report “unknown” location?
Kansas couple sues IP mapping firm for turning their life
into a “digital hell”
… As any geography
nerd knows, the precise center of the United States is in northern
Kansas, near the Nebraska border. Technically,
the latitudinal and longitudinal coordinates of the center spot are 39°50′N
98°35′W. In digital maps, that number is
an ugly one: 39.8333333,-98.585522. So
back in 2002, when MaxMind was first choosing the default point on its digital
map for the center of the U.S., it decided
to clean up the measurements and go with a simpler, nearby latitude
and longitude: 38°N 97°W or 38.0000,-97.0000.
As a result, for the last 14 years, every time MaxMind’s database has been queried about the location of an
IP address in the United States it can’t identify, it has spit out the default
location of a spot two hours away from the geographic center of the country.
Perspective. Yet
another company that finds mobile used more than desktops.
Alibaba posts record growth as mobile revenue tops desktop
for first time
Certainly novel.
Online used-car startup Carvana gets $160 million in new
funding
Online used-car startup Carvana, known for delivering vehicles through vending machines, said
today it closed a $160 million funding round that brought the total raised to
nearly half a billion dollars.
… The company
operates automated towers holding several cars. A customer can buy a car online and can either
pick it up from the vending machine or have it delivered.
At the machine, customers are required to enter their
details on a tablet, after which they get a coin. When the coin is inserted into the machine the
ordered car is automatically delivered from the machine.
Perhaps a project for the Electrical Engineering class? Few details.
Watch the video.
This Startup Wants to Build a Drone-Proof Fence to Protect
Your Property
… Linda Ziemba is
the founder of Drone Go
Home, a drone intrusion prevention system that offers mobile and permanent
installations
If you send a message to a politician, do you expect them
to re-lie?
Got something to tell the president? Try the White House's
new Facebook bot
There are lots of ways to vary (twist) a business
model. A friend recently attended a
seminar on “How to get around Denver” that talked about light rail, busses,
Uber, and this one:
Driving Miss Daisy, Inc.
(Related) I found this one while searching for DMD.
GoGoGrandparent
An assistant for folks that don't like smartphones.
No comments:
Post a Comment