WBU Cybersecurity Recommendations on Broadcasters’ Use of Cloud-based Services

The use of cloud-based services by broadcasters is now ubiquitous across the industry. Use cases can range from traditional internal virtual facilities to the use of third-party public services, for the delivery of all broadcast applications, such as content hosting, virtualized production, delivery over IP, etc.

Cloud capacity can be commissioned within minutes, making broadcasters more agile and more able to deploy additional functionality in response to market needs. Like any other third-party service employed, broadcasters need to be fully cognizant of the cybersecurity implications of employing this capacity.

Read the full paper here.

Global Task Force for Public Media

As the COVID-19 crisis continues, the role of public media has never been so important. The Global Task Force for public media have issued their first statement recognizing the essential service of public broadcasters during the pandemic:

“The year 2020 will be forever etched in our minds. No matter where we live, we share common experiences of fear, grief and the suffering that comes with uncertainty. And yet in this time of crisis, we are seeing communities come together as never before. We are discovering an even deeper respect for our health workers and other first responders, as well as for the many unsung heroes who are putting the needs of others ahead of their own, often at considerable risk.

Rarely has the role of public service media been of greater importance than it is now. That is why we, the members of the Global Task Force for public media, would like to add our salute to the essential service being provided at this time by public broadcasters around the world.”

 

NABA-TC Cybersecurity Sub-Committee publishes Best Practices in an Effective Enterprise Anti-Phishing Program

Phishing is a form of social engineering whereby threat agents attempt to deceive users or take advantage of a user’s trust, in order to steal sensitive information, or to gain illegal access to credentials, internal networks, systems, databases, or other valuable enterprise assets. The key to an effective enterprise anti-phishing program is maintaining a high degree of staff awareness and training, on a continuous basis.

The NABA-TC Cybersecurity Sub-Committee published NABA Recommendations for Best Practices in an Effective Enterprise Anti-Phishing Program.