Tuoretta digiturvasisältöä ja webinaareja

Tilaa Digiturvatulkki-uutiskirje ja saat sähköpostiisi tärkeimmät digiturvauutiset selkokielelle tulkattuina sekä tiedon tulevista ilmaisista tietoturva-aiheisista webinaareista.
Kiitos! Klikkaa vielä saamaasi vahvistuslinkkiä (sähköposti otsikolla "Vahvista sähköpostiosoitteesi") ja uutiskirje saapuu jatkossa sähköpostiisi.
Valitettavasti jotain meni pieleen. Voit olla yhteydessä tiimi@tietosuojamalli.fi.

ENISA publishes procurement guidelines for cybersecurity in hospitals

The EU Agency for Cybersecurity (ENISA) published a cybersecurity procurement guide for hospitals. The hospital is a vast ecosystem comprised of an entire network of devices, equipment and systems that often require connection to external systems, making monitoring and control a very hard task to do. This is due to the high sensitivity of medical data and the potential vulnerability the sector is faced with, cybersecurity has to be applied every step of the way … More → The post ENISA publishes procurement guidelines for cybersecurity in hospitals appeared first on Help Net Security.

Supply Chain Attacks

25.2.2020

Is your phone listening to you?

Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first on WeLiveSecurity

CyberNow

24.2.2020

Racoon Malware Steals Your Data From Nearly 60 Apps

An infostealing malware that is relatively new on cybercriminal forums can extract sensitive data from about 60 applications on a targeted computer. [...]

Malware

24.2.2020

97% of IT leaders worried about insider data breaches

A staggering 97% of IT leaders say insider breach risk is a significant concern, according to a survey by Egress. 78% think employees have put data at risk accidentally in the past 12 months and 75% think employees have put data at risk intentionally. When asked about the implications of these breaches, 41% say financial damage would be the area of greatest impact. More than 500 IT leaders and 5000 employees were surveyed across the … More → The post 97% of IT leaders worried about insider data breaches appeared first on Help Net Security.

Insider Attacks

24.2.2020

Increased monetization means more ransomware attacks

Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28% lower than the 78-day median observed in the previous year, according to FireEye. Consultants attribute this trend to organizations improving their detection programs, as well as changes in attacker behaviors such as the continued rise in disruptive attacks (e.g. ransomware and … More → The post Increased monetization means more ransomware attacks appeared first on Help Net Security.

Ransomware

24.2.2020

Users still engaging in risky password, authentication practices

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or inconvenience, according to Yubico and Ponemon Institute. The conclusion is that IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and … More → The post Users still engaging in risky password, authentication practices appeared first on Help Net Security.

Password Attacks

24.2.2020

Looking at the future of identity access management (IAM)

Here we are: at the beginning of a new year and the start of another decade. In many ways, technology is exceeding what we expected by 2020, and in other ways, well, it is lacking. Back to the Future made us think we would all be using hoverboards, wearing self-drying and fitting jackets, and getting to and from the grocery store in flying cars by Oct. 21, 2015. Hanna-Barbera promised us a cutting-edge, underwater research … More → The post Looking at the future of identity access management (IAM) appeared first on Help Net Security.

Outdated Access Rights

21.2.2020

How to Use NIST’s Cybersecurity Framework to Foster a Culture of Cybersecurity

Faced with increasing volume and sophistication of cyber threats, CISOs and security teams need to find ways to ... Read More The post How to Use NIST’s Cybersecurity Framework to Foster a Culture of Cybersecurity appeared first on Hyperproof. The post How to Use NIST’s Cybersecurity Framework to Foster a Culture of Cybersecurity appeared first on Security Boulevard.

Employee Negligence

21.2.2020

5 phishing-esimerkkiä - mistä tunnistat huijauksen?

Phishing-huijaukset yleistyvät jatkuvasti ja niitä kohdistetaan kaikenlaisiin organisaatioihin. Millaisia huijaukset ovat ja miten voit suojautua?

blogiartikkeli

23.5.2019

Mikä on Digiturvakartta?

Digiturvakartta tiivistää digiturva-asiat yhdelle slaidille. Tutustu taustaan tässä artikkelissa tai live-versioon.

blogiartikkeli

24.5.2019

Tietosuojamallista päivittyi Digiturvamalli

Tietosuojamalli päivittyi Digiturvamalliksi! Sisältö laajenee, käyttötapa yksinkertaistuu entisestään. Lue tarkemmin, kuinka työpöytä auttaa luomaan oman digiturvasuunnitelmanne ja valvomaan sen toteutusta!

blogiartikkeli

20.8.2019

Tietojärjestelmien fiksu hallinta - lähtökohta digiturvalle

Hyvää digiturvaa ei voi olla ilman järjestelmällistä tietojärjestelmien hallintaa.

blogiartikkeli

10.4.2019

Microsoft: Älä käytä Internet Exploreria oletusselaimena

Suurin osa moderneista verkkopalveluista ei enää toimi kunnolla Internet Explorer -selaimella. Microsoft suosittelee IE:tä käytettävän ainoastaan yhteensopivuustyökaluna järjestelmien kanssa, jotka eivät muuten toimi.

blogiartikkeli

2.4.2019

Salasanojen turvallisuus - Vältä yleisimmät virheet

Nykyajan digimaailmassa ainoa järkevä vaihtoehto salasanojen turvalliseen hallintaan on käyttää tähän suunniteltua ohjelmistoa apuna.

blogiartikkeli

15.4.2019

Käyttöehdot päivittyivät - Lue tiivistelmä muutoksista

blogiartikkeli

30.1.2019

Google sai jättisakot – ja sen pitäisi kiinnostaa myös suomalaisia

Ranskan tietosuojaviranomainen (CNIL) liittyi mukaan GDPR-sakottajien kerhoon – läimäisemällä Google LLC:lle 50 miljoonan euronsakot (21.1.2019). Vaikka sakkosumma kuulostaa jättimäiseltä, sakot olisivat Googlen miljardeissa mitattava vuotuinen kokonaisliikevaihto ja tietosuoja-asetuksen sallima sakkomaksimi huomioon ottaen voineet olla huomattavasti isommatkin. Mitä tapauksesta olisi sitten syytä ottaa opiksi?

blogiartikkeli

28.1.2019