Tag Archive for: champion

Plumas Bank announces commitment to respecting data by becoming a 2023 Data Privacy Week Champion


Plumas Bank just announced its commitment to Data Privacy Week 2023 by registering as a Champion. As a Champion, the local bank supports the principle that all organizations share the responsibility of being conscientious stewards of personal information. This year’s initiative emphasizes educating businesses on data collection best practices that respect data privacy and promoting transparency

Data Privacy Week is an annual expanded effort from Data Privacy Day — taking place from January 22 – 28, 2023. The goal is to spread awareness about online privacy among individuals and organizations. The goal is twofold: to help citizens understand that they have the power to manage their data and to help organizations understand why it is important that they respect their users’ data.

Plumas Bank Executive Vice President and Chief Information Officer, Aaron Boigon, commented, “Securing our clients’ data is a top priority at Plumas Bank. It’s important to note that everyone has a responsibility to protect their personal data. A few simple ways to protect your data are to create strong passwords and change them often, install trusted computer security software, and check your social media accounts privacy settings regularly. Throughout this week follow Plumas Bank’s social media (Facebook and LinkedIn) for tips on protecting your privacy.”

The National Cybersecurity Alliance has offered up the following themes to help guide individuals and businesses to better data privacy practices:

Advertisement

Data: The Story of You

All your online activity generates a trail of data. Websites, apps, and services collect data on your behaviors, interests, and purchases. Sometimes, this includes personal data, like your Social Security and driver’s license numbers. It can even include data about your physical self, like health data – think about how a smartwatch counts and records how many steps you take.

While it’s true that you cannot control how each byte of data about you and your family is shared and processed, you are not helpless! In many cases, you can control how you share your data with a few simple steps. Remember, your data is precious, and you deserve to be selective about…

Source…

Cybersecurity Awareness Month Champion | See Yourself in Cyber | Contrast Security


Contrast Security champions Cybersecurity Awareness Month

Another year has passed, and once again Contrast is proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in promoting global awareness of online safety and privacy. Co-led by the National Cyber Security Alliance and the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security, this annual campaign is a global effort between businesses, government agencies, colleges and universities, associations, nonprofit organizations, and individuals and is designed to raise awareness and help everyone stay safe online.

Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline attack, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

With this onslaught of negative news, it can be easy for individuals to become overwhelmed and to feel powerless in the face of what can feel like insurmountable threats posed by cybersecurity. But in actuality, nothing could be further from the truth.

Why security matters more than ever right now

Even security professionals can become complacent when it comes to practicing good online hygiene and maintaining security best practices every day. It is important to remember why these sorts of standards matter when it comes to protecting both yourself and your place of work from exploitation.

With all of the jargon that is typically thrown around in relation to cybersecurity, there is a long-standing misperception that cybersecurity is beyond everyday people and that it should be left to the professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to live with them. But this just isn’t true. In fact, everyone has a huge role to play in cybersecurity threat prevention, detection and remediation, regardless of their level of technical expertise. Any and all technology users are very much the…

Source…

Product Security Needs A C-Suite Champion


Chief Product Officer at GrammaTech, where he leads product strategy for the company’s application security testing product portfolio.

Five years ago, Congress was concerned enough about the safety of devices in the emerging Internet of Things that it considered creating ratings to show the security level of connected products. The law proposed a scale like the Energy Star efficiency ratings to validate products that are designed to minimize their vulnerability to hacking and protect users’ privacy and safety.

While that legislation may have been ahead of its time, not much has developed since to give users visibility into the security of devices that are everywhere today, from the camera in your smart doorbell to the critical infrastructure in the power grid.

One development is encouraging: the evolution of product security executives (PSE), the professionals responsible for the security of cyber-physical products. They are the ones who ensure the software inside these devices is secure and not vulnerable to cyberattacks.

PSEs share some responsibilities with the chief information security officer (CISO), but they have very different functions. PSEs focus on the digital security of products, including software, firmware or other products embedded in hardware. They implement a product security program that addresses cybersecurity throughout the product life cycle. In short, they are responsible for keeping bad actors from breaking into their products via the software.

Just like the role of CISO grew in response to the explosion of data breaches in the first wave of digital disruption, the PSE has been a response to the growth of “phygital” operations, where many processes that were once manual are now digital and controlled by networked devices. Everything from pacemakers to cars can be vulnerable to hackers if the code inside them is compromised, but the security of these devices has not always been top-of-mind.

Even organizations that take information security seriously may need to put more focus on the security of the code inside the products they make, as can be seen by the size of the teams and the number of resources dedicated to one versus the other. The hack

Source…

Tech Data Opens Cyber Range to Champion Cybersecurity Training, Demonstration and Engagement – KSL.com

Tech Data Opens Cyber Range to Champion Cybersecurity Training, Demonstration and Engagement  KSL.com
“cyber warfare news” – read more