The state of cybersecurity: What 2016 will bring
With cybersecurity breaches dominating 2015’s headlines on a regular basis, it is clear that today’s organisations simply cannot defend against every threat. Savvy cybercriminals are continuing to find...
View ArticleChanging human behaviour is the key to thwarting cyber threats in 2016
The staff at PhishMe Inc., a provider of phishing threat management solutions, has offered three predictions for the threats it believes UK organisations will battle in 2016: Phishers will continue to...
View ArticleSecurity pros are moving beyond the humble password
Security professionals are increasingly moving beyond passwords towards alternative authentication methods according to a new survey. The study by Wakefield Research for two-factor authentication...
View ArticleLooking back at the top 4 cybersecurity trends of 2015
2015 has been a big year for cybersecurity. We’ve seen some of the biggest data breaches on record, fallout from crippling hacktivism attacks (see Ashley Madison and the spill over from 2014’s Sony...
View ArticleTalkTalk CEO admits to learning the hard way
TalkTalk chief executive Dido Harding has told the House of Commons Culture, Media and Sport Select Committee that the firm has major “lessons to learn” after the breach on its systems in October....
View Article2016: New cyber security trends and new approaches to data protection
Based on what has happened this year, 2015 should go down as a tipping point for how companies approach data security for years to come. Some of the biggest companies in nearly every major industry...
View ArticleData protection: The winners and losers of 2015
2015 will be remembered as the year corporate data loss entered the mainstream. Throughout the year, it seemed like every week there was news around a new data breach or cyber attack. [see_also]...
View ArticleCyber security – Reducing the risk of an attack
The recent Global Fraud Report by Kroll last month revealed that 75 per cent of companies fell victim of fraud in the past year, a large proportion of these incidents involving the theft of personal...
View ArticleWhat bad security habits do we need to give up in 2016?
2015 has played host to some significant cyber breaches. Experian, TalkTalk and Ashley Madison all fell foul of malicious attacks, and they weren’t the only ones. In 2016, businesses need to resolve to...
View ArticleYou’re NOT fired: How a CISO can impress the board
Earlier this month, Joseph Valente was named the winner of The Apprentice 2015 and Alan Sugar’s new business partner. Valente triumphed over 17 rivals during the process and will pocket 250,000 to...
View ArticleCompanies ill-prepared for cyber attacks in 2016
2015 will be marked as the year when corporate cyber crime got serious. Despite the fallout from the massive Sony hack at the end of 2014, the year began with chief executives in the UK regarding cyber...
View ArticleTime Warner Cable suffers suspected data breach, 320,000 customers at risk
Earlier this week, American telecommunications company Time Warner Cable (TWC) revealed that up to 320,000 of its customers may have had their email addresses and passwords stolen. [see_also] The...
View ArticleThe fall-out from Safe Harbour and other security predictions for 2016
As we look back on an eventful 2015, business leaders will be reviewing their plans for the new year. Given the hacks on businesses and government agencies, a theme that will carry over into 2016 is...
View ArticleSecurity: The reason to move to the cloud
Rob Alexander, CIO of the large US financial firm Capital One, stood on stage at the AWS re:Invent event and told the audience “We can operate more securely on AWS than we can in our own data centres.”...
View ArticleWhy 2016 will be the year of records management – and five steps to stay...
If 2015 was the year of high profile data breaches then 2016 may well be the year when records management finally makes its voice heard in the boardroom. Looking back on the last year it’s clear that...
View ArticleFighting tomorrow’s cyber threat landscape
Cybercrime will not be letting up anytime soon. In fact, reflecting on the informed opinions of 33 Intel Security thought leaders in the McAfee Labs Threats Predictions Report, it is clear that...
View ArticleBoosting security in the post-password workplace
The past few years have seen the password undergo a startling transformation, from a key factor in security to an outdated and ineffective liability. The response from many companies to the growing...
View ArticleManaging and protecting data in the NHS
Expectations of the UK’s National Health Service (NHS) continue to rise, with mounting pressures from a government programme requiring billions of pounds in efficiency savings, and the strain placed on...
View ArticleWhat is on the cyber security horizon in 2016?
The scale and cost of security breaches has nearly doubled over the last year, according to recent findings from PWC. [see_also] In fact, a shocking 9 out of 10 large organisations now admit to...
View ArticleConflicting forces – Finding a balance in the technology environment of 2016
As we enter 2016, we can look back once again on a year of a rapid change. Data continues to grow exponentially. According to EMC, by 2020, the digital universe will grow 300 times from the present 130...
View Article