Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Incident & Breach Response
The Return of the Luddite: Securing Critical Systems
Also, Hacking Air-Gapped IT Systems Over the InternetThe latest edition of the ISMG Security Report leads off with a look at why organizations turn to paper when critical systems can't be secured.
Also in the Security Report, you'll hear (click on player beneath image to listen):
- How air-gapped computer systems can be hacked over the internet;
- ISMG Security and Technology Editor Jeremy Kirk analyze Microsoft's efforts to squelch a brewing controversy over whether it unfairly disables third-party anti-virus products in Windows 10; and
- About worries in Congress that cybersecurity could become a partisan issue.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our June 16 and June 20 reports that respectively analyze how the WannaCry worm continues to attack unpatched systems at increasing rates and the apparent death of the Neutrino exploit kit.
The next ISMG Security Report will be posted on Tuesday, June 27.
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.