fbpx
Size of letters 1x
Site color
Image
Additionally
Line height
Letter spacing
Font
Embedded items (videos, maps, etc.)
 

“Breach&Fraud.IT” Committee meeting

18/ 10/ 2018
  How secured your database is? Meeting results: The lecture on “Breach&Fraud.IT” was held on the 18th of October. Nowadays, the question of cybersecurity is difficult to overestimate. It concerns business, governmental and non-governmental structures as well as anyone who has ever used the internet for purchasing something online, logging in at any website or just watching any kind of video. The amount of victims of internet frauds and data breaches are increasing because of the evolution of digitalization in Ukraine. Both governmental and private units as well as people who used their services are suffering from frauds and breaches. We pretty sure, you want no one to have information about your electronic payments and transactions as well as personnel correspondence. Company UnderDefense as leading Ukrainian and worldwide expert shared their experience concerning cybersecurity problems and theirs solution, while Advice Group representatives provided us with information how to act and protect yourself from legal point of view. “Legal hackers” demonstrated tremendous databases such as credit cards (nearly 400 000), e-mails with passwords, personnel information and correspondence that freely circulate at the internet. Such data breaches regards not only developing countries but also world leaders as the US and Europe. A lot of issues concerning cybersecurity and data breaches’ causes and consequences for both domestic (Private bank, Nova Poshta) and global (Facebook, Uber, Yahoo) companies were discussed within the meeting. Approximately, 90% of Ukrainian companies do not care about cybersecurity, so they have no clear plan or backup copying in cases of security breaches. Experts suggest conducting tests from time to time in order to detect weaknesses of their systems – so called “pentesting”. We came to conclusion that human factor acts a main role in your security, so the ranking of attributes required to protect your company has following order: People>Process>Tools. It means that qualitative software is good but the crucial point is to have a qualified people who run the processes. Everyone also expressed their thoughts about new Ukrainian cyber police and as a result – feelings are more positive than vice versa. Despite the priorities and accomplishments aren’t perfect, but it is good enough as a regulatory unit. In addition, experts said that increasing control level from governmental side might transform Ukraine to China or North Korea. From the legislation point of view, the visitors got the information how to protect themselves against unconscientious IT specialists. At the end of the meeting, we discussed general questions concerning personnel security. We decided ESET to be one of the best antivirus software; data is better not to be stored at cloud services; you should use service “haveibeenpwned” to check whether your e-mail being listed at hacked databases. The meeting appeared to be brisk and interesting. Approximately three hours of constant discussion passed imperceptibly and provided information would definitely help you to save tour data in modern digital environment.

How secured your database is? Meeting results: The lecture on “Breach&Fraud.IT” was held on the 18th of October.

Nowadays, the question of cybersecurity is difficult to overestimate. It concerns business, governmental and non-governmental structures as well as anyone who has ever used the internet for purchasing something online, logging in at any website or just watching any kind of video.

The amount of victims of internet frauds and data breaches are increasing because of the evolution of digitalization in Ukraine. Both governmental and private units as well as people who used their services are suffering from frauds and breaches. We pretty sure, you want no one to have information about your electronic payments and transactions as well as personnel correspondence.

Company UnderDefense as leading Ukrainian and worldwide expert shared their experience concerning cybersecurity problems and theirs solution, while Advice Group representatives provided us with information how to act and protect yourself from legal point of view.

“Legal hackers” demonstrated tremendous databases such as credit cards (nearly 400 000), e-mails with passwords, personnel information and correspondence that freely circulate at the internet. Such data breaches regards not only developing countries but also world leaders as the US and Europe.

A lot of issues concerning cybersecurity and data breaches’ causes and consequences for both domestic (Private bank, Nova Poshta) and global (Facebook, Uber, Yahoo) companies were discussed within the meeting.

Approximately, 90% of Ukrainian companies do not care about cybersecurity, so they have no clear plan or backup copying in cases of security breaches. Experts suggest conducting tests from time to time in order to detect weaknesses of their systems – so called “pentesting”.

We came to conclusion that human factor acts a main role in your security, so the ranking of attributes required to protect your company has following order: People>Process>Tools. It means that qualitative software is good but the crucial point is to have a qualified people who run the processes.

Everyone also expressed their thoughts about new Ukrainian cyber police and as a result – feelings are more positive than vice versa. Despite the priorities and accomplishments aren’t perfect, but it is good enough as a regulatory unit. In addition, experts said that increasing control level from governmental side might transform Ukraine to China or North Korea.

From the legislation point of view, the visitors got the information how to protect themselves against unconscientious IT specialists.

At the end of the meeting, we discussed general questions concerning personnel security.

We decided ESET to be one of the best antivirus software; data is better not to be stored at cloud services; you should use service “haveibeenpwned” to check whether your e-mail being listed at hacked databases.

The meeting appeared to be brisk and interesting. Approximately three hours of constant discussion passed imperceptibly and provided information would definitely help you to save tour data in modern digital environment.

Partners

If you have found a spelling error, please, notify us by selecting that text and pressing Ctrl+Enter.

Start
in the Telegram bot
Read articles. Share in social networks

Spelling error report

The following text will be sent to our editors: