{"id":5342,"date":"2021-09-07T09:23:16","date_gmt":"2021-09-07T09:23:16","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5342"},"modified":"2021-09-07T09:33:18","modified_gmt":"2021-09-07T09:33:18","slug":"risk-awarenes","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5342","title":{"rendered":"Risk Awareness"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5342\" class=\"elementor elementor-5342\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69905723 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69905723\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54bb801a ot-flex-column-vertical\" data-id=\"54bb801a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b866d4c elementor-widget elementor-widget-text-editor\" data-id=\"3b866d4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"size-full wp-image-2074 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Cyber-Security-Awareness-1024x536-300x157-1.jpg\" alt=\"\" width=\"300\" height=\"157\" \/>With growing frequency, the business press is reporting security breaches at highly reputable organizations whereby sophisticated cybercriminals gain access to highly sensitive information. Valuable corporate information assets, in addition to personal or financial information of customers and employees, can be exposed to cybersecurity risks. As a result, organizations are making cybersecurity risk a top-priority of their enterprise risk analysis given the numerous risk issues that cybersecurity breaches create for organizations who experience an intrusion event.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a0ca5a7 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a0ca5a7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fe86af2 ot-flex-column-vertical\" data-id=\"6fe86af2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d0e5c1 elementor-widget elementor-widget-iserv_box\" data-id=\"8d0e5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-unlock-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Need for Strengthened Oversight of Cybersecurity Risks<\/h5>\r\n\t            <div>Many of the recent cybersecurity events are providing compelling lessons about corporate data security vulnerabilities. They are highlighting risk exposures related to their core intellectual property assets and other trade secrets. Board concerns are growing with directors now asking management to describe the organization\u2019s processes for identifying, assessing, and monitoring the ever-changing nature of cybersecurity risks. Many are making cybersecurity a top-priority risk oversight issue.\n\nCybersecurity risks arise from highly sophisticated computer criminals who may or may not be actively supported by foreign governments or organized terrorist organizations. Some are using technology access to steal intellectual property, while others are funded by foreign governments who are seeking to do damage related to national security and national economies. In some cases, cyber criminals are able to secretly penetrate a network and create the ability over time to move throughout a system without detection, leaking information in small increments for extended periods of time.<\/div>\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-193114a ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"193114a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4759af6 ot-flex-column-vertical\" data-id=\"4759af6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57b5921 elementor-widget elementor-widget-iserv_box\" data-id=\"57b5921\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-unlock-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Recommendations for Senior Executives and Boards Regarding Cybersecurity<\/h5>\r\n\t            <div>Below are Datasecure\u2019s recommendations for consideration by senior executives and the board of directors as they evaluate cybersecurity risks and the need for responses to manage those risks. Some of the recommendations are summarized below:\n\nSenior management should report regularly to the board of directors the organization\u2019s cybersecurity risk profile and corresponding governance systems to address those risks\nPublic companies should evaluate whether cybersecurity risks should be included in their risk factor disclosures with the SEC\nA strategy for identifying, assessing, managing and monitoring cybersecurity risks should be established and a C-level executive should be assigned responsibility for managing those risks\nManagement should evaluate their \u201cinsider threat\u201d risks, and develop plans to mitigate any damage that could be caused by Wikileaks-type situations\nTraining and awareness programs should be developed to raise employee awareness of cybersecurity risks to help prevent, detect, and abate those risk threats\nManagement should develop contingency plans and response strategies for what might be an inevitable cybersecurity risk\nFor more, please contact DataSecure today for a free consultation\n\nOrganizations should evaluate whether there are government resources that might provide relevant assistance to address certain types of cybersecurity risks.<\/div>\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59c824a elementor-widget elementor-widget-image\" data-id=\"59c824a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"712\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Cyber-Security-Awareness-Infographic-web-768x712-1.jpg\" class=\"attachment-large size-large wp-image-2075\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Cyber-Security-Awareness-Infographic-web-768x712-1.jpg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Cyber-Security-Awareness-Infographic-web-768x712-1-300x278.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Cyber-Security-Awareness-Infographic-web-768x712-1-720x668.jpg 720w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With growing frequency, the business press is reporting security breaches at highly reputable organizations whereby sophisticated cybercriminals gain access to highly sensitive information. Valuable corporate information assets, in addition to personal or financial information of customers and employees, can be exposed to cybersecurity risks. As a result, organizations are making cybersecurity risk a top-priority of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5342","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5342"}],"version-history":[{"count":8,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5342\/revisions"}],"predecessor-version":[{"id":5351,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5342\/revisions\/5351"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}