{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

How Cyber-Safe Are Your Data?

Risk assessment of sensitive data should begin with these common-sense approaches

Mary McAtee
Tue, 02/10/2015 - 13:37
  • Comment
  • RSS

Social Sharing block

  • Print
Body

One of the positive peripheral results from the flurry of reactions to the movie The Interview, was a media focus on cyber-terrorism. The recognition of cyber-attacks has been slow to evolve but is gaining traction.

ADVERTISEMENT

In the United States’ last major threat-assessment document, prepared during the final year of the Bush Administration, the term “cyber-threat” is mentioned fewer than 10 times. Last year’s assessment, prepared by the Obama Administration, mentions “cyber-terrorism” fewer than 100 times. The recently released joint intelligence threat-assessment document mentioned cyber-terrorism more than 1,000 times.

C-SPAN recently televised the briefing to the U.S. House Intelligence committee by the National Security Agency (NSA) and CIA. As redacted as I am sure it was, it was still chilling. Malware (most likely introduced by China years ago) has been identified in several locations in the infrastructure for the nation’s power grid and water purification and delivery systems. Although this specific threat has been neutralized, the idea of a foreign government or other groups planting a latent threat that can be activated when and if the mood strikes is very unsettling.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us