Yahoo just announced that they have fallen victim to the biggest data breach in history. It is believed that the account information including names, email addresses, passwords and phone numbers of at least 500 million user accounts were stolen in 2014 by a ‘state-sponsored actor’.
This news serves as a reminder that cybercrime is widespread, and email will always be vulnerable to attacks. This is just one example, and email attacks are increasing and becoming more sophisticated. Dr. Abel Sánchez, Research Director at MIT told Diligent earlier this year “If cybercriminals can profit from penetrating your system and gaining access to your data, they will.” He added, “The most sensitive and most prize-worthy information that exists is at the executive level.”
The biggest risks to this high-value data are people, outdated processes and insecure technology. Using outdated, insecure tools to manage intellectual property, finance and strategic information material puts data at greater risk from a breach.
Our CEO, Brian Stafford said, “You would be surprised how many companies still believe it’s acceptable to send sensitive board documents and conversations over email.”
Communicating this information in an email that goes outside of the company’s firewall can expose the information to a range of cyber-attacks and hacks including phishing, malware, and attacks like Yahoo’s.
Hackers will choose weakest security systems to penetrate because these are the cheapest and easiest to infiltrate. It’s important to remember that it’s significantly more expensive to deal with the fallout of a security breach than it is to invest in infrastructure to prevent and protect company information.
The best way companies and individuals can protect themselves is to adopt a technology solution which is the gold standard for information security management, and most importantly, to keep sensitive material out of email if at all possible!
Board Portal Buyer’s Guide
With the right Board Portal software, a board can improve corporate governance and efficiency while collaborating in a secure environment. With lots of board portal vendors to choose from, the whitepaper contains the most important questions to ask during your search, divided into five essential categories.
December 28, 2020
What Role Does the Board Play in Business Continuity Planning?
Continuing in the face of adversity has been the dominant theme of the past year. When the scale of disruption caused by COVID-19 became clear, businesses worldwide were forced to adapt rapidly to the restrictions that came into force overnight. While many organisations have business continuity plans designed to keep…
December 21, 2020
Business Continuity Plan Maintenance: A Step-by-Step Guide
A business continuity plan (BCP) is a living, evolving document. Designed to be activated when unplanned disruption strikes, it must be flexible enough to guide actions regardless of the specifics of the situation. In a fast-changing environment, business continuity plan maintenance is an essential part of the business continuity programme…
December 8, 2020
Board Meeting Minutes Best Practices and Guidelines
Guidelines for Board Meeting Minute Taking In order to keep the courtroom from invading the boardroom, the most basic rule is, “saying less is often better,” warns the London-based law firm Bricker & Eckler in a recent note. “Today’s business climate places heightened…