FOCUS ON EUROPE
Kevin Epstein VP of threat operations centre, Proofpoint – on email and social media
Email is still the leading attack vector but threat actors are depending more and more on us as the
weakest link – individual people ie. social engineering. Email isn’t actually perfect for social engineering because you have a few minutes to think about it. There are much more immediate things like mobile apps and social networks. Someone posts something and your instinct is to reply immediately. That’s the essence of social media. We researched top global
companies and whether their brands had been hacked and misused. Out of the major brands researched there was, on average, one hack of their social media channels every
William Hague former leader of the Conservative Party – on data privacy
Apple against the FBI, what is the right answer? There are really strong arguments on both sides of that. But, in the end, in my view we
can’t have an absolute right to keep things private and secret in a world where we have to enforce the law, we have to find the criminal network or the terrorist cell. That means, in the end, parliaments, governments and the public are going to insist on the ability to do so. Tech companies and other businesses should prepare themselves for that.
We can’t have an absolute right to keep things private and
secret in a world where we have to enforce the law."
business day. That’s a little troubling. We then examined the major media brands’ Facebook and Twitter pages. We found that one in five Twitter accounts that claimed to be the brand was legitimate and two in five Facebook pages. The biggest spike in email attacks happens on Tuesday mornings, business hours, and the biggest spike in social media attacks is at 4pm because that’s when people are weak, clicking on social media. When it comes to emails, people
who are sending and receiving those work much more closely to companies’ security teams because it’s considered the lifeblood of the company. But social media seems to be delegated to marketing. From a corporate branding perspective if it appears that your CEO is tweeting vulgarities or racial epithets that has phenomenal brand impact. It’s really painful. You’d think you’d want to
apply at least as much security to that as wire transfers. If a wire transfer got through you’d lose tens of thousands of pounds. If your main Facebook page starts shouting racial epithets what’s the brand damage? I’m willing to bet it’s a lot more than £100,000. On customer service channels on
The biggest spike in social media
attacks is at 4pm because that’s when people are weak.”
Twitter we’ve watched attackers wait until a shift change in customer service staff. Let’s say you were discussing a problem with your bank account with a member of customer service then there’s a change in shift. Let’s say you were talking to someone with Twitter handle @ MajorBank. You then receive a tweet from @MajorBankCustomerService saying “we can solve your problem. Just send us your bank details on our private channel.” It happens daily.
Stephanie Weagle senior director of marketing, Corero – on IT and security teams
Security is top of mind for me but, in some marketing organisations, they’re going to be
most worried about user experience and making sure that the message is translated properly in a digital environment, and security is not necessarily on the top of the list of things they’re worried about on the day-to-day. You’re relying on your IT department or network security department to handle those things on your behalf, and that’s not always necessarily the best approach.
Our marketing team
and IT team are very much integrated and because we’re focused on DDoS protection we’re always worried about the hackers and attackers coming after us specifically because we specialise in preventing this type of attack. So we work very closely with the IT department to make sure our DDoS protection is where it’s supposed to be. If you have a website
that’s integrated with your CRM system and your marketing automation, if you’re getting hammered with form fills on your website, that’s going to crack everything that’s behind your website.
Our marketing
team and IT team are very much integrated ."
37 issue 28 summer 2016
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68