ISACA Now Blog


 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

Ransomware: Why Are Organizations Still So Vulnerable?

Rob Clyde, CISM, Board Director, ISACA, Executive Chair of the Board of Directors at White Cloud Security
Posted: 5/19/2017 3:09:00 PM | Category: Security | Permalink | Email this post

Ransomware attacks are not new. In fact, ISACA has been sounding the alarm on the increasing spate of ransomware for quite a while. Unfortunately, it takes a massive-scale cyber attack like the recent WannaCry incident for such cyber crimes to gain national and international notoriety. In fact, another recent ransomware attack that caught the public’s attention in the U.S. came when San Francisco’s transportation department was hit last November, impacting the city’s light rail transit system.

There is a reason why ransomware attacks are becoming popular: For the bad guys, it simplifies the crime and the process of monetization.


Shedding the Human Bias in Risk Identification and Analysis

Ookeditse Kamau, CISA, MBA, CIA, CRMA, IT Internal Auditor
Posted: 5/18/2017 3:04:00 PM | Category: Risk Management | Permalink | Email this post

During the risk analysis process, information is availed through internal reports, external reports, surveys and face-to-face meetings during risk workshops. The amount of information to be analyzed depends on the risk maturity of an organization, as some risk managers continuously collect information that they deem relevant to improving the risk process. The question is, to what level is the information used objectively? How much reliance is placed on what we remember or what we deem as being important?

Behavioral physiologists believe the amount of information we remember has an impact on how we analyze and rate risks. Prior to analyzing risks, we identify events or threats that can exploit vulnerabilities identified in organizations’ processes and systems. It is during the “What can go wrong?” stage that we need to be careful. In his book “Thinking, Fast and Slow,” Daniel Kahneman notes three factors that can manipulate our minds:


How Can We Get More Young People Excited About IT?

Larry Alton, Writer,
Posted: 5/16/2017 3:08:00 PM | Category: ISACA | Permalink | Email this post

There are a lot of exciting things happening in the IT field, which means there’s a tremendous amount of growth occurring in a lot of businesses. With that growth comes the need to hire cost-effective talent. This begs the question: How can we get more young people excited about launching careers in IT?

Why IT?
When you ask children what they want to be when they grow up, you’ll hear an array of answers. From firefighter and police officer to professional athlete or doctor, there are a handful of occupations that always seem to draw interest from children.


WannaCry: Is this a Watershed Cyber Security Moment?

Raef Meeuwisse, CISM, CISA, Author, “Cybersecurity Exposed”
Posted: 5/15/2017 6:57:00 AM | Category: Security | Permalink | Email this post

As I watched the news, I was struck by the inaccuracy of much of the initial coverage of the massive wave of ransomware attacks that surfaced on 12 May. Even my partner thought that the National Health Service (NHS) computers, as well as other targets around the world, were being intentionally targeted by a coordinated global cyberattack.

The truth was far worse. This was no more than an infection designed to take advantage of environments that failed to have even the most basic of cyber security protection in place.


Ransomware: Healthcare Organizations Cannot Afford to Be Unprepared

Raef Meeuwisse, CISM, CISA, Author, “Cybersecurity Exposed”
Posted: 5/12/2017 3:47:00 PM | Category: Security | Permalink | Email this post

I had just typed the last word of a new ISACA publication on governance of enterprise information technology for healthcare environments when today’s news on the National Health Service (NHS) ransomware attack broke.

As we now know (as of the time of this writing):
  •  At least 16 UK National Health Service (NHS) trusts are affected, as well as unspecified other UK government departments and agencies
  •  The malware used has been identified as “Wanna Decryptor,” which is preventable by some forms of anti-malware.
  •  The action of the malware is to encrypt desktop-based files and position a ransomware message on the desktop and as a readme file.

<< First   < Previous     Page: 1 of 152     Next >   Last >>

 About This Blog


This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.


To volunteer to write a blog or suggest a topic send an email here.