7 min reading time
I have many thoughts on this. But I’m not going to write them. This is your conversation. Has the Sony breach been mentioned at work? At the watercooler or in the executive office? Are you going to shuffle priorities at all? Are you going to spend money on cybersecurity in 2015? Or is it business as usual for you? ++++++++++ Medical Device Cybersecurity is a major initiative at CDRH/FDA. See http://medgroup.biz/CDRH-security and we invited FDA to cover this topic at the 10x Medical Device Conference in May. ++++++++++ Make it a great week. Joe Hage P.S. If Sony hasn’t scared you, this book certainly will: http://medgroup.biz/Future-Crimes Denise Skidmore James (Jim) Dent Johnny Ross Burrell (Bo) Clawson James (Jim) Dent There are even rumors this week (in the news) that it may have been an inside Sony publicity stunt (rumor only), to boost ticket sales based on the recent announcements by the movie awards agencies that all terrorist, sniper, and war-type movies were recently shunned in the recent movie awards. Burrell (Bo) Clawson For any medical company with proprietary products today, I think a high level security coding consultant or in house security employees who know and follow security issues at the code level must be a part of the company team. These people inhabit a different world than application coders and you can’t be good at both. Dave Saunders Additionally, any IT security training for the staff should always include some basic “why” training in addition to the training of the mechanics of how to follow the policies. Narayanachar Murali Bogdan Baudis You must have missed that in the new brave world of Linux and Windows it is state-of-the-art to manage permissions by groups and simple inheritance and the only thing than “old” IT does is juts gunks up the business flow! Old dinos who saw at least a little of the old mainframe system management know that the problem IS solvable. But it requires an effort and as we already have established: IT is just eating into profits… it is only going to be more interesting when even more managers will start bypassing IT and ordering on their own the new spanking clouds which are advertised to enable getting rid of old that musty IT junk. After all there is nothing better than outsourcing the problems, is there not? Narayanachar Murali Curt Harrington PATENTAX.COM Joe Hage Narayanachar Murali Burrell (Bo) Clawson I am not a coder, but I have always wondered why a corporate network allows anyone who has admin access to copy a whole database, without a secondary “launch” approval from a 2nd person. If your whole livelyhood is dependent on one Oracle, IBM or FileMakerPro database, then why should it not be like the ICBM missile silos where it takes 2 people to execute life threatening operations. Compartmentalized, 2 factor user access on company computers for business use only with real time network monitoring overseen by competently trained IT people/consultants, disconnected/isolated networks for critical items, mandatory user education and triple sets of both timed backups and clones of all computer partitions for fast recovery with the mandatory off site physical storage of hard drives. Denise Skidmore Joe Hage And I think the underlying message is, “No, it’s too big a problem and it’s unlikely to hit us. A cost-benefit analysis says take no action, which is our unspoken plan.” Am I hearing you correctly? Arundhati Parmar We are moving towards an unprecedented and amazing smart future but then means that the industry has to think of cybersecurity more than it ever has. Curt Harrington PATENTAX.COM Burrell (Bo) Clawson I would modify that and say that in small businesses, one untrained user can lose their entire customer DB with just one key that is lost. I watched a person in a very successful business with extremely high end clients do an admin access to allow a sales person access to a function in front of 4 other people. It was easy to watch her 6 character PW entry. There are competitors in the same field who would love to steal that PW. But, they would probably be more likely to PAY FOR IT. Denise Skidmore Marked as spam
|