Cybersecurity Ventures.<\/a><\/p>\nEven the world\u2019s most sophisticated cybersecurity entities are attacked.<\/p>\n
As evidence, a hacker breached a payroll system used by the UK\u2019s Ministry of Defence. The outsiders gained access to the names and banking details of current and some past armed forces members.<\/p>\n
EU strengthens cybersecurity regulations with new practices<\/h3>\n The EU understands that protection needs to improve and, in response, implemented two security standards. The regulations change how organisations treat their cybersecurity infrastructure.<\/p>\n
\u201cRisk management is moving away from art to science,\u201d stated Darren Humphries, Group CISO & CTO-Partner at Acora.<\/p>\n
NIS\u2019 aim is to create high level, common cybersecurity regulations. The specification strengthens system security requirements, addresses supply chain security, streamlines reporting, and introduces stringent supervisory measures that may result in sanctions.<\/p>\n
In January 2023, businesses were given 21 months, until October 2024, to put compliant measures in place.<\/p>\n
DORA mandates the establishment of periodic digital operational resilience testing capabilities and requires the implementation of management systems to monitor and report significant ICT-based incidents to the relevant authorities.<\/p>\n
This comprehensive approach strengthens the IT security of financial entities such as banks, insurance companies, and investment firms. The goal is for their systems to remain resilient in the event of any severe disruption.<\/p>\n
Three European Supervisory Authorities \u2013 the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA) and the European Securities and Markets Authority (ESMA) \u2013 began creating the standard.<\/p>\n
They established mandatory incident reporting requirements for financial firms to report significant cyber incidents and breaches to relevant authorities. The standard also encourages cooperation and information sharing among financial entities and regulators to respond effectively to cybersecurity threats.<\/p>\n
However, not all types of assessments are effective. \u201cSelf-attestation is really not working,\u201d Darren noted. The MOD breach occurred in part because the government agency accepted self-service attestation from their suppliers. A better option is to have a third-party cybersecurity specialist evaluate the processes.<\/p>\n
What this means for businesses<\/h3>\n The threat landscape continually becomes more menacing. Corporations, especially those in the financial services industry, need to become more proactive in closing potential security holes.<\/p>\n\u00a9 shutterstock\/Monster Ztudio<\/figcaption><\/figure>\nEU cybersecurity regulations are prodding enterprises to do so, but they need to do so while leaning on third-party specialists and not just examining their own systems.<\/p>\n
Corporations need to ensure that they protect network transactions. They need to understand what these regulations entail and then put business processes in place to comply with them and how third-party input minimises the chance of oversights.<\/p>\n","protected":false},"excerpt":{"rendered":"
The European Union requires businesses adopt tighter cybersecurity regulations to safeguard sensitive information. Is this enough?<\/p>\n","protected":false},"author":22,"featured_media":48786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530],"acf":[],"yoast_head":"\n
Is the EU doing enough to tighten cybersecurity regulations?<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n