Introduction - Part 01 - Prof. Saji K Mathew

NPTEL-NOC IITM
7 Aug 202323:48

Summary

TLDRThis introductory cybersecurity and privacy course aims to raise awareness about the importance of these topics for managers. The instructor discusses the relevance of cybersecurity in protecting data from unauthorized access and vulnerability management. Through real-life examples, including a spear-phishing email and a ransomware attack, the course illustrates the prevalence and impact of cyber threats. It emphasizes the growing concern over privacy and the intersection of cybersecurity and privacy, highlighting the need for understanding and addressing these issues in today's digital world.

Takeaways

  • 📘 The course 'Cybersecurity and Privacy' aims to introduce and motivate students about the importance of cybersecurity in today's digital world.
  • 🔒 Cybersecurity is about managing vulnerabilities in computer systems and networks to protect data from unauthorized access.
  • 🙋‍♂️ Privacy concerns the control individuals have over their personal data and the security measures in place to protect it.
  • 🤔 The course will explore the relationship and intersection between cybersecurity and privacy, emphasizing their relevance to managers across various fields.
  • 🎯 The instructor uses real-life examples, such as a suspicious email from a director, to illustrate the prevalence of cybersecurity threats like phishing and spear phishing.
  • 📧 Phishing emails are a common method of social engineering where attackers use background information to deceive recipients into revealing sensitive information.
  • 🛡️ Awareness and vigilance are crucial in identifying and responding to potential cybersecurity threats, such as verifying the authenticity of emails and websites.
  • 💻 Ransomware attacks, where hackers encrypt a victim's data and demand payment for its release, are a significant and growing concern in the cybersecurity landscape.
  • 🏥 Healthcare data is particularly sensitive, and unauthorized access can have severe implications, as seen in the AIIMS cyber attack incident.
  • 🛍️ The impact of cyber attacks can be industry-wide, affecting retail, manufacturing, and healthcare sectors, leading to operational disruptions and financial losses.
  • 🌐 The script highlights the dual nature of the digital world, with both opportunities for growth and a dark side of cybersecurity threats that need to be managed.

Q & A

  • What is the main focus of the course 'Cybersecurity and Privacy'?

    -The course 'Cybersecurity and Privacy' focuses on understanding the importance of cybersecurity, its relevance to managers, and the intersection between cybersecurity and privacy.

  • Why is cybersecurity considered an important topic for practicing managers?

    -Cybersecurity is important for practicing managers because it involves protecting data and systems from unauthorized access, which is crucial for maintaining the integrity and confidentiality of organizational information.

  • What are the three key terms associated with cybersecurity mentioned in the script?

    -The three key terms associated with cybersecurity mentioned in the script are data, vulnerability, and unauthorized access.

  • What is the difference between general phishing emails and spear phishing emails?

    -General phishing emails are unsophisticated attempts to trick recipients into providing sensitive information, while spear phishing emails are highly targeted, based on social engineering, and use specific background information about the recipient to increase the likelihood of a successful attack.

  • What is an example of a real-life incident involving spear phishing mentioned in the script?

    -An example of a real-life incident involving spear phishing mentioned in the script is an email received by the instructor, seemingly from the director of IIT Madras, requesting a meeting, which turned out to be a phishing attempt.

  • What is the significance of the text message about PAN card verification in the context of cybersecurity?

    -The text message about PAN card verification is significant as it illustrates a common tactic used in phishing attacks, where a seemingly legitimate request is used to lure victims into revealing sensitive information or clicking on malicious links.

  • What is ransomware, and how does it affect an organization?

    -Ransomware is a type of malicious software that encrypts a victim's data and demands payment in exchange for the decryption key. It affects organizations by disrupting operations, potentially causing significant financial loss, and compromising sensitive data.

  • Why is healthcare data considered particularly sensitive in the context of cybersecurity?

    -Healthcare data is considered particularly sensitive because it contains personal and confidential information about individuals' health conditions, which, if leaked, can lead to embarrassment, discrimination, or other serious consequences.

  • What was the outcome of the ransomware attack on the Chennai corporation's PCs?

    -The Chennai corporation decided not to pay the ransom after realizing that their PCs were outdated and running on an old operating system. They chose to let the machines remain locked rather than give in to the hacker's demands.

  • How prevalent are cyber incidents according to the E&Y report mentioned in the script?

    -According to the E&Y report summarized in the script, 91 percent of organizations reported at least one instance of a cyber incident within a year, highlighting the widespread nature of cybersecurity threats.

  • What is the dual nature of the digital world as discussed in the script?

    -The dual nature of the digital world, as discussed in the script, includes a bright side, where digital technologies enable economic growth and progress, and a dark side, where cybersecurity threats and attacks pose risks to organizations and individuals.

Outlines

00:00

📘 Introduction to Cybersecurity and Privacy Course

The script introduces a course on Cybersecurity and Privacy, aiming to break the ice and familiarize participants with the course content and expectations. The instructor seeks to motivate students by discussing the importance of cybersecurity, its relevance to managers, and the intersection between cybersecurity and privacy. The course aims to clarify why cybersecurity should be a concern for managers and to explore the concepts of data protection, vulnerability, and unauthorized access.

05:03

🔍 Identifying Phishing Attempts and Social Engineering

This paragraph delves into the topic of phishing emails and social engineering. The speaker recounts a personal experience with a suspicious email, purportedly from a high-ranking official, and discusses the importance of verifying the sender's identity. The email in question was identified as a spear-phishing attempt, a targeted form of phishing based on gathered background information. The speaker emphasizes the need for vigilance against such threats, which are becoming increasingly sophisticated and relevant in the digital age.

10:08

🚨 Real-World Examples of Cybersecurity Threats

The speaker provides real-world examples of cybersecurity threats, including personal experiences with a text message asking for PAN card verification and a fake login page mimicking the State Bank of India's site. These instances highlight the prevalence of cyber threats in everyday life. The paragraph also references news reports about increasing cyber attacks and ransomware incidents, emphasizing the severity and widespread nature of these issues.

15:10

💡 The Impact of Ransomware Attacks

This section focuses on the impact of ransomware attacks, where hackers encrypt victims' machines and demand payment for decryption. The speaker discusses a specific case involving retail stores using POS software by Kaseya, which were hit by a ransomware attack, leading to significant operational disruptions. The paragraph also mentions the Chennai corporation's response to a ransomware attack and the broader implications of healthcare data breaches, as exemplified by the AIIMS incident.

20:18

🌐 The Dual Nature of the Digital World

The final paragraph reflects on the dual nature of the digital world, highlighting both its benefits for economic growth and the dark side of cybersecurity threats. The speaker notes the ubiquity of cybersecurity issues in the news and the high percentage of organizations affected by cyber incidents. The paragraph concludes with a discussion on the increasing priority of cybersecurity among CEOs and organizational leaders, underscoring its importance in the modern digital landscape.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. In the video, it is a central theme, with the instructor emphasizing its importance for managers and providing real-world examples of cybersecurity threats, such as phishing emails and ransomware attacks.

💡Privacy

Privacy, in the context of the video, pertains to the control individuals have over their personal information and the protection of that information from unauthorized access or disclosure. The instructor discusses privacy alongside cybersecurity, highlighting the intersection of the two, especially in the case of healthcare data breaches.

💡Vulnerability

A vulnerability is a weakness in a system that can be exploited by a threat actor to compromise the integrity, availability, or confidentiality of a system. The script mentions vulnerability in the context of cybersecurity, where the instructor talks about the need for vulnerability management to protect against unauthorized access to data.

💡Unauthorized Access

Unauthorized access describes the act of accessing a system, data, or resource without permission. The term is used in the script to illustrate the risks associated with cybersecurity, such as when the instructor discusses the protection of data from unauthorized use.

💡Phishing

Phishing is a type of online scam where attackers attempt to acquire sensitive information, such as usernames, passwords, and credit card details, by disguising themselves as a trustworthy entity. The script includes a detailed example of a phishing email received by the instructor, which was disguised as a message from a high-ranking official.

💡Spear Phishing

Spear phishing is a targeted form of phishing where the attacker collects information about the target to create a personalized email that appears legitimate. The script describes spear phishing in the context of an email that impersonated a known authority figure within the institution, making it more likely to deceive the recipient.

💡Ransomware

Ransomware is a type of malicious software that encrypts a user's data and demands payment to restore access. The video discusses ransomware as a prevalent cybersecurity threat, giving examples of its impact on businesses and healthcare institutions.

💡Social Engineering

Social engineering involves manipulating individuals to divulge confidential information or perform actions that compromise security. The script mentions social engineering in the context of spear phishing, where the attacker uses background information about the target to increase the likelihood of a successful attack.

💡Data Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The script discusses the consequences of data breaches, particularly in the healthcare sector, where the breach of personal health data can have severe implications.

💡Cyber Incident

A cyber incident is any event that targets an organization's use of cyberspace and can compromise the integrity, availability, or confidentiality of information stored on a system. The script cites a report indicating that 91 percent of organizations face at least one cyber incident per year, underscoring the prevalence of cybersecurity threats.

💡Digital Transformation

Digital transformation refers to the integration of digital technology into all areas of a business, fundamentally changing how an organization operates and delivers value to customers. The script touches on the bright side of digital transformation, but also the dark side, represented by the growing concerns of cybersecurity.

Highlights

Introduction to the Cybersecurity and Privacy course and its importance for practicing managers.

The significance of cybersecurity as a topic and its relevance to managers across various fields.

Understanding the term 'cybersecurity' in the context of data protection and unauthorized access.

The concept of 'privacy' and its distinction from cybersecurity, focusing on personal data disclosure choices.

The intersection between cybersecurity and privacy and their collective importance.

A real-life example of an email from the director of IIT Madras to illustrate the dangers of phishing emails.

The process of identifying a phishing email by checking the sender's email address and the content's professionalism.

The difference between general phishing emails and spear phishing, which is based on social engineering.

The prevalence of cybersecurity threats in daily life, as evidenced by personal experiences with phishing attempts.

The importance of verifying website addresses when prompted to sign in, to avoid fake login pages.

The increasing number of cyber attacks reported in the media, indicating a growing concern for cybersecurity.

An explanation of ransomware attacks and their impact on businesses, including the demand for ransom payments.

The case of the Chennai corporation's refusal to pay a ransom in a ransomware attack due to outdated systems.

The critical nature of healthcare data and the implications of unauthorized access, as seen in the AIIMS cyber attack.

The significance of the HIPAA act in the US for the protection of healthcare data, highlighting its sensitivity.

The dichotomy between the benefits of digitalization and the dark side of cybersecurity threats.

Statistics showing that 91 percent of organizations faced at least one cyber incident in a year, underscoring the urgency of cybersecurity measures.

The growing recognition of cybersecurity as a top priority for CEOs and organizational leaders.

Transcripts

play00:16

Good morning and welcome to this course - Cybersecurity and Privacy.

play00:23

I want to welcome you and I thank you for signing in for the course Cybersecurity and

play00:31

Privacy.

play00:33

Today is the day of introduction and therefore we will be breaking the ice and also get to

play00:41

know what the course would contain, in terms of contents of what I would deliver from this

play00:49

course and what I expect you to do as part of this course or the coursework.

play00:56

These are the two main things that we will discuss but I will also try to motivate you

play01:03

about the topic.

play01:06

So that is very important when we start- Is this topic important?

play01:14

Is cybersecurity an important topic?

play01:17

And should it really bother or should it really be a matter of concern for practising managers,

play01:27

irrespective of what you manage?

play01:30

Should managers be concerned about cybersecurity?

play01:32

And if so, why?

play01:36

That is something that we would try to address in the first session so that you have a clarity

play01:41

of why one should credit a course or why one should actually spend so much time going through

play01:54

a six credit course to do, to understand cybersecurity and privacy.

play02:01

So the title is Cybersecurity and Privacy.

play02:06

I just want to know what is your understanding about cybersecurity?

play02:13

So you can just talk about, what do you mean when you hear this term cybersecurity?

play02:18

There are two terms- cybersecurity and privacy.

play02:22

So it is an "and" there.

play02:24

So feel free to talk about it.

play02:29

As to what is your understanding?

play02:31

So, cybersecurity is more about vulnerability management of the computers and the network

play02:36

system, so that the data whatever is there that gets protected and you know unauthorized

play02:39

use of the data without the knowledge of the owner.

play02:47

Okay good.

play02:48

So you have three keywords.

play02:49

One is data, other is about vulnerability, third is about unauthorized access.

play02:57

So these are certain key terms that is associated with cybersecurity .Anything else?

play03:04

Any other thoughts on cybersecurity?

play03:07

Okay, what do you think about privacy?

play03:14

That is the second term.

play03:15

See, the title is actually consisting of two key terms- cybersecurity and privacy.

play03:19

Okay good.

play03:21

So we talked about two things one is privacy,is about me and my data which I choose to disclose,

play03:30

I choose not to disclose and other is the security layer which exists at some level,

play03:41

some system level.

play03:42

Alright, so there are two things cyber security and privacy and the interface or the intersection

play03:50

between the two is also important.

play03:52

So, how is cybersecurity and privacy related?

play03:57

So that is another aspect of the course.

play04:01

Okay, let me actually give you some more background information as we go, to get a motivation

play04:10

to understand- Is cybersecurity and privacy a current topic?

play04:15

Is it an important topic?

play04:17

And is it relevant to managers?

play04:22

So, here is an email I received some time back from the director of IIT Madras and when

play04:33

you receive an email in your official emailbox and it is from the top boss,you pay attention

play04:41

to it.

play04:42

So his name is written and it is a request and there is content of course to meet him

play04:51

and of course it ends well, best regards, name and designation, right.

play05:03

So what should I do to this email?

play05:10

And I know Professor Ramamurthy ,he does contact people when he wants to give some specific

play05:16

roles or administrative roles particularly ,he did have this habit of calling up people

play05:23

or writing personal emails and doing like this.

play05:27

So this is an instance of that kind.

play05:30

So what should be my response?

play05:41

I should check the email id.

play05:44

Why should I do that?

play05:46

Because you know ,we do not check the sender id when you get an email from your colleague

play05:51

or from your area head or department head .We just have a lot of communications going

play05:59

on.

play06:01

No.

play06:04

How, why should I doubt this mail?

play06:07

Sir, there is no need to be suspicious according to me because it does not demand anything

play06:22

like sensitive information from you, just asking you to drop an email.

play06:28

But I must tell you, I did check who sent this mail.

play06:34

I got suspicious.

play06:38

Can you imagine, what is the source of suspicion?

play06:46

This is?

play06:50

Well, that is okay.

play06:57

It is an internal mail, so this is fine.

play07:01

The signature part is fine, the address, everything is fine.

play07:08

Okay, it looks informal.

play07:12

The pattern is different from the other way of getting the same.

play07:17

Okay, yeah, I agree with you there is a slight change in the pattern, this is written like

play07:24

a very personal mail, you know, there can be some personal element when people write

play07:32

you professionally.

play07:34

But more than so but it is very personal.

play07:37

Can I have a quick, that is also fine,moment please.

play07:44

So this does not sound professional ,as you sensed, I also sense you know I do not expect

play07:51

him to say-" Can I have a quick moment with you?", right.

play07:55

So I became suspicious at that particular content.

play07:59

This cannot be from the director, okay or this may not be from the director because

play08:04

this is not the choice of words when you typically write to a colleague or in a professional

play08:12

setting.

play08:13

So and then, of course, as you suggested I decide who is sending this email, of course

play08:19

that is the first check all of us can do when we have a doubt,okay.

play08:26

And I found this email coming from a Gmail, not from the IITM domain and therefore this

play08:37

is obviously suspicious and we call this kind of mails as phishing mails.

play08:44

We typically call it phishing mails, but it is not just a phishing mail.

play08:49

Phishing mail, all of us get every day, in fact a lot of junk mail comes asking for our

play08:57

bank details or other kinds of personal information.

play09:01

We know that this is obviously phishing mail but here it takes time to resolve this because

play09:07

it is a colleague or it is a director and his address is given at the end.

play09:14

And the sender also knows that, well, I am a faculty member of IIT Madras and Professor

play09:21

Bhaskar Ramamurthy is the director, of course, the former director.

play09:27

So someone knows, who is who, in an organization okay.

play09:32

Somebody has actually collected background information, okay.

play09:35

We call it typically social engineering okay.

play09:38

So, this is social engineering based phishing mails, where the chance of one responding

play09:46

to this is much higher, okay.

play09:48

So not just a phishing mail someone from Africa writing ,I have a lot of funds to transfer

play09:53

why do not you share your bank account details.

play09:57

We obviously know, I do not have, I do not know anyone out there but this is from a non-circle

play10:03

based on social engineering and this is called spear phishing ,okay.

play10:08

Spear phishing is very specific ,based on social engineering where people or the hacker

play10:15

or the hands behind this, have done background study, okay.

play10:22

So then subsequently of course, Professor Ramamurthy sent a follow-up mail to all the

play10:28

colleagues because he knew that this phishing mail was circulating in the institute ,okay.

play10:36

So, this is sometime back and this is very recent, okay.

play10:39

So ,couple of weeks back, the head of our department wrote, again a similar mail- "Can

play10:46

you do something for me?"

play10:48

right.

play10:49

And here,again you see, the professor, you know, the proper title of the faculty member,

play10:55

the name and the signature, you say it is full signature.

play11:00

So, you usually tend to reply immediately, okay.

play11:04

So, what I essentially want to say here is that, we face this kind of problems or this

play11:14

kind of threats in the world of internet, in the world of so called, cyber world often

play11:24

and it is all part of our experience or it has become part of our day to day experience.

play11:31

What I am trying to do is to sample, to sample some instances which I came across either

play11:40

individually or from newspapers and to give you a sense of what is going on in the environment

play11:45

in the current times, okay.

play11:47

This is a text message I received,you know, in fact two weeks back and the text message

play11:58

asked me to do a verification of my PAN card, okay and it gives a link to the SBI site and

play12:06

I am sure all of you have,most of us have our account in the State Bank of India,okay.

play12:12

And of course, since this is request from a bank, you tend to respond to it ,right and

play12:20

it led me to this site, you know SBI and this login page looks exactly the same, okay, the

play12:27

bank logo and whatever fields you generally fill in, in the same font, in the same format

play12:35

is given and then you have to enter the captcha code and looks like I should be entering this

play12:40

data and signing in, to do whatever formality is required to keep my account on.

play12:47

But is there a problem here, I think by now all of us or most of us are familiar, so when

play12:53

you get a message to sign in somewhere, you go and the first thing that you look is what

play12:58

is the what is the website, is it giving the right address or it is giving a fake address

play13:08

In this case, we know that this is not SBI website from where we sign in, it is online

play13:18

SBI, but it is something else.

play13:19

So, as soon as ,even when I sign into a bank account on a regular basis, I of course check

play13:27

the address because sometimes a wrong address may pop in and we may be signing in and the

play13:33

signing in data including your username, password may be going elsewhere.

play13:38

So, yeah, let me continue this so, I just show you some things I faced as an individual,

play13:47

okay as an individual or of course this phishing mail is something that went to everyone so

play13:55

as a group or as an organization, we do come across instances of cyber security or cyber

play14:04

security related issues and these are clips from leading newspapers of India where it

play14:12

recently reported increasing number of cyber attacks, okay.

play14:17

And the last piece is about ransomware attacks, have you heard of ransomware attacks?

play14:24

okay but denial of service attack is different from ransomware, we will be we will be discussing

play14:29

a case on denial of service but ransomware is a, is another kind of a security threat

play14:39

where the one who attacks, so the hacker, takes control of your machine and encrypts,

play14:51

in fact encrypts your machine and ask you for money to release it.

play14:56

It is like when you lock your house and go away and when you come back you find that

play15:03

your house is, there is another layer of a lock on your house and you cannot enter the

play15:10

house because somebody else has locked and the hacker is quite fair, well, I will give

play15:17

you the key to enter but give me some money, okay ,and let us not make let us not make

play15:23

it complicated, just give me some money, the key is with me- take the money, take the key,

play15:27

unlock and go in, okay.

play15:29

So it is ransom, you know the word ransom is, about you know, it is about paying to

play15:34

release someone ,okay ,so ransom redemption etc related words, so you have to pay a ransom

play15:44

to release your machine from someone else's control,okay, ransomware infact ransomware

play15:52

is one of the most frequent attacks, in terms of threat intelligence in today's world,ransomware

play16:01

has become very common and this is something about which the world,as a whole is concerned

play16:08

about, okay.

play16:12

Here is a report ,again from newspapers, as I said, this is another sample which happened

play16:20

predominantly in the western world, where the POS machines, you know, the POS machines

play16:28

are typically in a retail store, when you buy something and when you check out ,there

play16:32

is a POS point of sale machine, where you actually do the checkout process and make

play16:38

the payment and then take your items and come out, but if suppose in a very busy day on

play16:47

a retail store if the POS machine stops working, okay, then you know the kind of chaos and

play16:54

also you know the operations just stop there because companies which are automated, they

play17:01

would not have a manual process to continue business, okay.

play17:04

So your shops just close down and this did happen in 2021 when retail stores which used

play17:14

the POS software built by Kaseya,okay, Kaseya is an IT company which provided POS solutions

play17:24

and several retail stores in the west stopped because there was a ransomware attack, you

play17:31

see, what is the ransomware attack- the hacker just want 70 million dollars to restore the

play17:41

machine and the most of the times, the hacker is very is a good thief, you know you call

play17:48

it good thieves, you pay the money and it is done, you know, the machine is released

play17:53

but if you do not pay the money it is, it is very very difficult, okay, to become operational

play18:01

and generally in my reading, I found that companies just pay the money and restart the

play18:08

business okay.

play18:09

The only exception I came across is in Chennai, okay, so Chennai corporation’s PC’s were

play18:17

attacked by hackers and it was a ransomware attack, okay and Chennai corporation refused

play18:23

to pay the money, okay, because they found that the machines were very outdated ,okay,

play18:28

so they were running on windows 8 and it is very easy to take control of machines which

play18:34

are not updated with the operating systems and they said ,okay, let it be locked forever

play18:40

so they did not pay but for critical business operations when ransomware attack happened

play18:49

,okay, so it is huge loss, okay, so per hour loss will be very huge as compared to the

play18:56

ransom that the hacker is asking for ,okay.

play18:58

So and that has become a serious nuisance in today's world and here is more report so

play19:06

I am not exactly following a chronological order in actually presenting to you the different

play19:12

cyber attacks that happened in the recent times but this is November-December 2022,

play19:20

you must have read this in newspapers about All India Institute of Medical Sciences.

play19:25

So, five servers were hacked by the cyber criminals and they took control and you know

play19:34

the biggest concern when a hospital's data center gets, comes under attack, okay, this

play19:44

is a different type of data, this is healthcare data,okay, and someone takes control or someone

play19:54

gets access, you know, you said unauthorized access, okay, somebody gets unauthorized access

play20:00

to my personal health data, okay, in India we may not be so concerned about health data

play20:08

but health data when it goes into the wrong hands has huge implications ,can you imagine

play20:18

why,so much so that in the US, there is a act called HIPAA, okay ,so that relates to

play20:28

healthcare it is a regulation for healthcare data alone, why is the world so concerned

play20:33

about healthcare data protection, can you can you just imagine and give me some quick

play20:41

answers, once you have a health condition.

play20:43

So health care data is super sensitive because the the person whose health data is leaked

play20:59

the the person actually faces huge embarrassment ,okay and it the person also can face losses

play21:07

in an organization or it may have higher consequence and that is why the top hospital of the country

play21:16

when their servers were attacked or came under cyber threat, it became a huge concern, huge

play21:24

national concern.

play21:26

So we see cyber attack happening in all spheres, you know, all domains, it is not just, we

play21:33

just saw Kirloskar, you know ,it is a manufacturing company, we saw AIIMS healthcare, these are

play21:38

all very recent news, so you just open the newspaper, everyday newspaper this is what

play21:44

I see , there is some piece of information or some, something that is covered about cyber

play21:50

security, almost everyday, okay.

play21:52

So we all talk about digital world,digitization, digital India and so on, so you see a very

play21:58

bright side of how digital technologies are actually enabling the growth of the economy

play22:03

or enabling the country to actually progress, be in the line of progress, we also see alongside

play22:09

a dark side,there is a bright side- very bright side of digital and there is also a dark side

play22:17

or the dark world that develops alongside and that is the concern of cyber security

play22:23

okay, so the world consist of good people and bad people, okay.

play22:27

So there are bad people in the world ,who understands the weaknesses or as you use the

play22:36

word vulnerabilities and can exploit those vulnerabilities very, very well and damage,

play22:44

cause damage and losses the impact of such actions can be very high ,okay, to the extent

play22:53

that the recent, I think this is E&Y report, which is summarized in the newspaper, which

play23:00

shows 91 percent of the organizations reported at least one instance of cyber incidence in

play23:08

an year, at least one incident.

play23:11

So think about that 91 percent of organizations do actually face at least one incident an

play23:18

year, okay and it goes on to report how cyber security is becoming a top priority for CEOs

play23:25

or leaders of the organizations.

play23:31

So this is, the this piece is of grave concern to me, okay, so you know the changes that

play23:38

is happening in transportation.

Rate This

5.0 / 5 (0 votes)

Связанные теги
CybersecurityPrivacyManagersData ProtectionVulnerabilityUnauthorized AccessPhishingSpear PhishingRansomwareDigital Threats
Вам нужно краткое изложение на английском?