The Value of Information in Digital age

Information is processed Data. They come from every functional area of an organization. Information and information systems is the lifeblood of business. They drive organizations into future by managing products, services, customers, employees, streamlining operations and increasing productivity.


Information guarantees your organizations survival and business continuity. Imagine if one moment your organization looses it's information due to an event, which is accidental or maliciously planned or a natural disaster? 

 How do you answer to your shareholders, customers, suppliers, employees, authorities? How do you get your business back in operation, serve customers, generate revenue and pay your employees and suppliers? 

 It may not have happened yet. But do you have a guarantee that it will not happen today, tomorrow, next year or in five years. 

GOOGLE+
In October 2018, Google+ was shut down due to a bug caused 500,000 profiles not to include passwords. Google lost customers’ trust in the company.

SONY
In October 2018 bug in firmware of some SONY cameras led to loss of new photos when using certain SD cards. SONY updated the firmware after much damage was done.

Entrust
In August 18, 2022 LockBit ransomware made Entrust suffer a data breach, encrypted systems used for HR, finance and marketing. Entrust is digital security solutions company in USA serving largest organizations and across 150 countries could not protect them selves.

Finnish Parliament
Russian Hacker Group NoName057(16) has claimed responsibility for a denial-of-service attack that brought down the website of the Finnish Parliament on 9th August, 2022. 

Facebook
Facebook parent company Meta has been fined €17m for breaching EU data privacy laws, following an inquiry into 12 data breaches the Irish Data Protection Commission received during 2018.

World's largest organization's have suffered data losses due to insider and hacker attacks. What guarantee do you have that you won't be next?
 
Real Time Cyber Attacks from Fire Eye

Niranjan Meegammana 



Comments

Popular posts from this blog

ISO 27001 ISMS in a Nutshell

Best Practices for secure Software Development

How easily the data breaches occur? 5 ways to be aware of.