Page 6 - Security Today, June 2017
P. 6

Products | Technology | Solutions
Security in Cyberspace
Cybersecurity has been a popular topic as of lately, and even more so now that Trump has signed an executive order that aims to strengthen the govern- ment’s cybersecurity. The order also hopes to better protect the nation’s critical infrastruc- ture from possible and future cyber attacks. Network security improvements will be made
especially for those government agencies that have had personal records and other sensitive date compromised from hackers. I hope we all see some improvements quickly.
And speaking of cybersecurity, one of our most recent Online Exclusives by Anas Baig discusses the top five countries for cyber attacks. Coming in first is China, which has been estimated by vari- ous reports to account for 41 percent of all cyber attacks around the globe. To me, that is an astounding amount of cyber crime coming from a single country. The United States is ranked in second place, with a little over 17 percent of all cyber attacks. Turkey, Brazil and Russia finish the list at third, fourth and fifth, respectively.
The article shines some light on growing cyber risks, and I know that each one of us can benefit from learning how to keep our per- sonal information a little safer as we venture out there in cyberspace each day.
Our REACTION blog addresses current events and receives great feedback from our active online community. We’d like to invite you to check out our recent posts and share your thoughts. If you’re in- terested in contributing to our Online Exclusives or our blog, please contact me at lpage@1105media.com or 972-687-6784.
Best Regards,
Lindsay Page
Online Exclusives
Top 5 Countries Where Cyber Attacks Originate
By Anas Baig
Cyber attacks have been around as far back as the internet itself. Most countries have fallen victims to the traditional style of cyber attacks originating from other countries and with the rate of infor- mation growing exponentially in value and in volume, cyber risks have started to pose serious threats to governments, businesses and economies around the world. It is possible the continuous growth in cyber attacks could result in man-made disasters around the world.
2016 saw some of the most destructive cyber attacks since the dawn of the internet. Looking at the recent trends of the past, we can expect this pattern to not only continue, but increase in severity.
Airport Security and Screening:
How the Rich and Famous Bypass the Queues
The increase of security at the world’s airports following the terrorist attacks on the 11th September 2001 resulted in travelers dealing with longer lines, more intrusive security measures and delays in getting cleared, checked and boarded. With global airline passenger num-
bers rising from 1.8 billion in 2000 to an estimated 2.8 billion in 2017, there is a growing demand and use of services for those who can afford it to bypass most of the delays that affect the vast majority of travelers.
Whether you are an international movie superstar, successful business-person or Grammy winning artist, the chance to save valu- able time during your international travels and bypass the millions of people that pass-through airports every day is often too good an op- portunity to pass up. But do those who pay for such luxuries undergo the same rigorous security procedures as the rest of us?
http://securitytoday.com
Recent Headlines
President Trump Signs Cybersecurity Executive Order Trump Fires Comey in Midst of Russia Investigation
Spirit Airlines Flight Cancellations Lead to Passenger Brawl French Presidential Campaign Sees Breach
Similar to Hack That Plagued Election World Password Day: Fact or Fiction
http://securitytoday.com/news
Upcoming Webinars
The Future of Remote Monitoring Artificial Intelligence and IoT
In this free webinar you will learn how IoT, Augmented Reality, and Vir- tual Reality will play a critical role in Remote Monitoring of the future.
The Lifecycle of an Active Shooter Incident
This one-hour free webinar introduces the most current thinking in early threat recognition, workforce training and effective intervention before, during and after an active shooter incident.
To view these Webinars at any time, please visit http://securityto- day.com/webinars.
REACTION Blog – Recent Posts
Cyber Risk: Lessons Learned from the Netflix Breach School Security: Assessing the Tone of the Situation
To check out our most recent blogs, visit https://securitytoday.com/ blogs/reaction/list/reaction.
Members of our staff and guest bloggers take advantage of REAC- TION to add their own perspectives on a broad range of security top- ics and issues. If you’d like to be a contributor, please contact Group Social Media Editor, Matt Holden at mholden@1105media.com.
Online Communities
Follow us on Twitter:
www.twitter.com/SecurToday
Become a fan on Facebook:
www.facebook.com/SecurToday
Pin with Us:
http://pinterest.com/securitytoday/
6
0617 | SECURITY TODAY


































































































   4   5   6   7   8