{"id":4873,"date":"2015-05-12T14:27:00","date_gmt":"2015-05-12T14:27:00","guid":{"rendered":"https:\/\/evssolutions.com\/how-international-cyber-security-stacks-up\/"},"modified":"2023-04-18T21:54:30","modified_gmt":"2023-04-18T21:54:30","slug":"how-international-cyber-security-stacks-up","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/how-international-cyber-security-stacks-up\/","title":{"rendered":"How International Cyber Security Stacks Up"},"content":{"rendered":"

\"There<\/span><\/span><\/p>\n

A business used to protect itself by locking its doors, but the Internet and mobile technology have increased the need to safeguard. While the Internet provides leads and new opportunities that may have not been generated otherwise; there are many risks that did not exist previously. In April we covered Congress\u2019 cyber security initiatives<\/a> and recently Secretary of State John Kerry, addressed cyber security as an international issue during his trip to South Korea. <\/p>\n

Secretary Kerry conveyed the importance of the Internet and how it contributes to a person\u2019s freedom. He emphasized the role America plays in promoting and maintaining cyber stability. In addition to international law that applies to the cyberspace, Secretary Kerry provided five guideline<\/a>s that all Internet using countries can observe. <\/p>\n

1. \u201cNo country should conduct or knowingly support online activity that intentionally damages or impedes the use of another country\u2019s critical infrastructure.\u201d<\/p>\n

2. \u201cNo country should seek either to prevent emergency teams from responding to a cyber security incident, or allow its own teams to cause harm.\u201d<\/p>\n

3. \u201cNo country should conduct or support cyber-enabled theft of intellectual property, trade secrets, or other confidential business information for commercial gain.\u201d<\/p>\n

4. \u201cEvery country should mitigate malicious cyber activity emanating from its soil, and they should do so in a transparent, accountable and cooperative way.\u201d<\/p>\n

5. \u201cEvery country should do what it can to help states that are victimized by a cyber attack.\u201d<\/p>\n

It is important for businesses to stay aware of international guidelines, laws and industry trends. Digital is continuing to dominate and e-commerce is growing; therefore, companies can easily conduct business anywhere in the world. EVS offers International Consumer Identity Verification<\/a> to assist businesses with knowing who their customers are and to protect against identity fraud. Awareness is key for protection, so pairing the software and knowledge can prepare businesses for the risks. <\/p>\n","protected":false},"excerpt":{"rendered":"

A business used to protect itself by locking its doors, but the Internet and mobile technology have increased the need to safeguard. The Internet provides leads and new opportunities that may have not been generated otherwise; however, there are many risks that did not exist previously. In April we covered Congress\u2019 cyber security initiatives and recently Secretary of State John Kerry, addressed cyber security as an international issue during his trip to South Korea.<\/p>\n","protected":false},"author":40,"featured_media":6303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[41,37],"tags":[],"class_list":["post-4873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legislation","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4873"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media\/6303"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}