{"id":30674,"date":"2022-11-02T08:58:05","date_gmt":"2022-11-02T12:58:05","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=511175"},"modified":"2022-11-03T09:55:47","modified_gmt":"2022-11-03T13:55:47","slug":"cyber-security-today-nov-2-2022-unhappy-infosec-leaders-a-list-not-to-be-on-and-more","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-nov-2-2022-unhappy-infosec-leaders-a-list-not-to-be-on-and-more\/","title":{"rendered":"Cyber Security Today, Nov. 2, 2022 \u2013 Unhappy infosec leaders, a list not to be on and more"},"content":{"rendered":"<p data-ar-index=\"0\">Unhappy infosec leaders, a list not to be on and more.<\/p>\n<p data-ar-index=\"1\">Welcome to Cyber Security Today. It\u2019s Wednesday, November 2nd, 2022. I\u2019m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.<\/p>\n<p data-ar-index=\"2\"><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/24869457\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-ar-index=\"3\">\n<p data-ar-index=\"4\"><strong>Ever had one of those days<\/strong> when you thought, \u2018I\u2019ve had it! To hell with this job\u2019? If you are a cybersecurity leader you have some company. One-third of 400 infosec leaders in the U.S. and the United Kingdom recently surveyed said they are considering leaving their job. Of those, one-third would do it in the next six months. <a href=\"https:\/\/www.blackfog.com\/cybersecurity-leaders-consider-quitting\/\" rel=\"noopener\">This is according to research done for a security company called BlackFog.<\/a> What may be surprising is the numbers aren\u2019t bigger considering the pressures of cybersecurity-related jobs. Thirty per cent of respondents said the part of the job they disliked the most is the lack of work-life balance. An almost equal number, 27 per cent, said too much of their time is spent fighting fires rather than focusing on strategic issues. On the other hand, 44 per cent said what they most like about their job is being the company\u2019s protector.<\/p>\n<p data-ar-index=\"5\">Something else to consider: Twenty-eight per cent said they had resigned from a previous job after a damaging cyber attack at their organization. And 13 per cent said they were let go because of a cyber attack.<\/p>\n<p data-ar-index=\"6\"><strong>Is your organization on the list?<\/strong> This is not a list of the best, the most profitable or the most beautiful companies. These are the companies that allegedly have been penetrated by hackers who are selling their access for further exploitation by other threat actors. Depending on the month, an average of 190 organizations are regularly listed by about 100 initial access brokers. That\u2019s according to a <a href=\"https:\/\/ke-la.com\/wp-content\/uploads\/2022\/10\/KELA-RESEARCH_Ransomware-Victims-and-Network-Access-Sales-in-Q3-2022.pdf\" rel=\"noopener\">recent report from Israeli cybersecurity firm Kela<\/a>. The access would be through things like compromised remote desktop portals for employees. An average price would be around $2,800. Access to some victims is sold by auction. For example, in July one broker set a starting price of $20,000 for access to an electric utility in France.<\/p>\n<p data-ar-index=\"7\"><strong>I\u2019ve warned before<\/strong> that clicking on an ad when doing an internet search can be risky. Unlike a standard link in a search, an ad-related link can go to a malicious website. Here\u2019s the latest example, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site\/\" rel=\"noopener\">as reported by the Bleeping Computer news site<\/a>: Recently people searching for the open source image editor called GIMP would see a result \u2014 labeled ad \u2014 that linked to the legitimate site \u2018www.gimp.org.\u2019 But those who clicked went to \u2018gilimp[.]org.\u2019 If they didn\u2019t look closely at the address bar, it looked like \u2018gimp.\u2019 And to be convincing the headline on the fake website said GIMP in big letters. And of course, that was the point \u2014 to fool unsuspecting victims into thinking was the real GIMP site so they\u2019d download software. They would think it was the GIMP editor, but instead was malware. Remember, ads on any search page don\u2019t look like an ad with a photo. They are pieces of text with a link. But on most good search engines an ad is labeled \u2018ad.\u2019 Google, Apple, Mozilla and other search engine companies try hard to screen out bad ads. Sometimes they fail.<\/p>\n<p data-ar-index=\"8\">Remember links to details about podcast stories are in the text version at <em>ITWorldCanada.com.<\/em><\/p>\n<p data-ar-index=\"9\">Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p data-ar-index=\"10\">\n<p data-ar-index=\"11\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-nov-2-2022-unhappy-infosec-leaders-a-list-not-to-be-on-and-more\/511175\">Cyber Security Today, Nov. 2, 2022 \u2013 Unhappy infosec leaders, a list not to be on and more<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This episode reports on infosec leaders considering leaving their jobs, hacked company access being sold and a warning about clicking on search<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-30674","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=30674"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30674\/revisions"}],"predecessor-version":[{"id":30749,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30674\/revisions\/30749"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=30674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=30674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=30674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}