{"id":29475,"date":"2022-10-07T08:27:41","date_gmt":"2022-10-07T12:27:41","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=507168"},"modified":"2022-10-07T10:01:55","modified_gmt":"2022-10-07T14:01:55","slug":"cyber-security-today-oct-7-2022-why-an-overhaul-of-your-business-continuity-plan-is-needed-and-more","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-oct-7-2022-why-an-overhaul-of-your-business-continuity-plan-is-needed-and-more\/","title":{"rendered":"Cyber Security Today, Oct. 7, 2022 \u2013 Why an overhaul of your business continuity plan is needed, and more"},"content":{"rendered":"<p>Why an overhaul of your business continuity plan is needed, and more.<\/p>\n<p>Welcome to Cyber Security Today. It\u2019s Friday, October 7th, 2022. I\u2019m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.<\/p>\n<p><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/24613569\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Think you have<\/strong> a good business continuity plan for surviving a cyber attack? You probably don\u2019t, according to James Arlen, chief information and security officer at Aiven [IVAN]. He gave that message in a keynote address at Thursday\u2019s SecTor conference in Toronto. Most IT and security leaders don\u2019t understand the interconnections of today\u2019s applications, he said, especially cloud apps. That\u2019s why when something breaks you may not know what do to. How to fix this? Start your plan all over again. Use the existing plan as a resource, Arlen said, but go back to square one and find all the dependencies \u2014 the software that depends on other software \u2014 in your all your applications. I\u2019ll have a detailed story about his argument on ITWorldCanada.com.<\/p>\n<p><strong>By coincidence<\/strong> BlackBerry released a survey this week of 405 senior IT, networking, and security decision-makers in the U.S., Canada and the U.K. It asked, among other things, about incident response plans. Just under 80 per cent of respondents said they have an incident management process. Of those, however, half think they lack the teams and tools for the plan to be effective around the clock.<\/p>\n<p><strong>A 19-year-old Australian ma<\/strong>n has been arrested for allegedly trying to use customer data recently stolen from the country\u2019s second-largest wireless carrier. <a href=\"https:\/\/www.afp.gov.au\/news-media\/media-releases\/man-arrested-alleged-data-breach-sms-scam\" rel=\"noopener\">Australian police said Thursday<\/a> the arrest came after a person texted 93 customers of cellphone provider Optus and demanded they transfer roughly $2,000 to a bank account. If they didn\u2019t, their personal information would be used for financial crime. The data seems to have been some of the stolen information of 10,000 Optus customers. Police said the accused isn\u2019t suspected of being the hacker.<\/p>\n<p><strong>Separately,<\/strong> Australia\u2019s largest telecom company <a href=\"https:\/\/exchange.telstra.com.au\/telstra-employee-data-breach\/\" rel=\"noopener\">acknowledged a data breach<\/a> at a third-party provider resulted in the theft of personal information of some staff dating back to 2017. The data stolen comprised names and email addresses of people who signed up for Telstra\u2019s employee rewards program. Telstra didn\u2019t say how many people were on the list.<\/p>\n<p><strong>As I told you<\/strong> in Wednesday\u2019s podcast there were questions raised about the advice Microsoft gave to administrators of on-premise Exchange email servers in the wake of the discovery of several zero-day vulnerabilities. <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\" rel=\"noopener\">Microsoft has now updated that guidance<\/a>. Administrators should check Microsoft\u2019s Security Response Center for the latest advice.<\/p>\n<p><strong>Finally,<\/strong> an American non-profit hospital chain with facilities across the country is still dealing with what it calls an \u201cIT security issue.\u201d The chain is CommonSpirit Health. <a href=\"https:\/\/www.washingtonpost.com\/politics\/2022\/10\/06\/an-unprecedented-hospital-system-hack-disrupts-health-care-services\/\" rel=\"noopener\">According to the Washington Post<\/a>, hospitals in Iowa, Nebraska, Tennessee and Washington State have had service disruptions. In a statement Wednesday the institution said as a result of the security issue some IT systems have been taken offline. <a href=\"https:\/\/www.king5.com\/article\/news\/health\/virginia-mason-cyber-attack\/281-1b3eb4eb-e8d8-421f-9d07-29affaee6308\" rel=\"noopener\">News reports said<\/a> some surgeries had to be rescheduled.<\/p>\n<p>That\u2019s it for now. But later today the Week in Review podcast will be available. Guest commentator David Shipley of Beauceron Security and I will talk about the meaning of Cybersecurity Awareness Month.<\/p>\n<p>Remember links to details about podcast stories are in the text version at ITWorldCanada.com.<\/p>\n<p>Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-oct-7-2022-why-an-overhaul-of-your-business-continuity-plan-is-needed-and-more\/507168\">Cyber Security Today, Oct. 7, 2022 \u2013 Why an overhaul of your business continuity plan is needed, and more<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This podcast reports on a presentation at the SecTor conference, an arrest in Australi<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-29475","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/29475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=29475"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/29475\/revisions"}],"predecessor-version":[{"id":29496,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/29475\/revisions\/29496"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=29475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=29475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=29475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}