Healthcare data breaches hit 111 million Americans last year
In the last year there have been a number of data breaches involving the healthcare industry. These included high profile attacks such as those on Premera Blue Cross and Anthem compromising millions of...
View ArticleEndpoint vs Network Security – Who wins?
If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing,that is always a good idea. The problem is that if you don’t secure the...
View ArticleIT trends in 2016: The evolution of enterprise mobility management
Mobility is always a hot topic; while it promises significant productivity benefits, it also brings security and management challenges to businesses. IT departments face a balancing act between...
View ArticleCyber attack costs TalkTalk 100,000 customers
The cyber attack suffered by communications provider TalkTalk last year was one of the most high-profile breaches of the year and the company has now revealed that it has cost them 101,000 customers....
View ArticleHumans at fault for data breaches in ‘unsurprising’, experts say
GovNewsDirect recently released new findings which show that humans are to blame for more than half of all data breaches in the UK’s public sector. The biggest issue seems to be with data ownership:...
View ArticleData breach costs UK firms £1.2 million on average
UK companies no longer believe data breaches are something that usually happens to someone else – they’re now expecting it, and expecting it to cost. According to the latest Risk:Value report from NTT...
View ArticleIT pros confident they can detect a cyber-breach
A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they weren’t that confident. The...
View ArticleHow to get to know your IT assets better this Valentine’s Day
Have a romantic dinner for two planned? Box of chocolates and flowers ready? Maybe a jumbo-sized stuffed bear holding a heart? If you don’t have anything set up with your significant other for...
View ArticleIt’s time the c-suite took data privacy seriously
Data privacy and security has been one of the biggest issues in business and technology over the past decade or so. Since the 2006 Nationwide Building Society incident, when a stolen unencrypted laptop...
View ArticleHow to mitigate your cloud computing risks
Cloud computing technology is fast becoming a solution for problems that have plagued organisations and taxed IT departments for years. Maintaining and managing IT in-house is a heavy burden for both...
View ArticleConsumers will avoid service providers that suffered a breach
Kaspersky Lab has recently done a survey to see how much data security practices of banks and online retailers affect consumers’ choices and, as it turns out, they do – significantly. The survey asked...
View ArticleSkills, strategy and security: The recipe to tackle cybercrime in 2016
Businesses are and increasingly will be, in the firing line of big cyber threats. Kaspersky Lab has announced the end of the Advanced Persistent Threat (APT) as we know it in 2016. Specifically, we...
View ArticleMalicious insiders are not the number one security threat
There have been 1,673 data breaches last year. They have led to 707 million data records being compromised. Those are the results of a new report by digital security firm Gemalto, entitled Breach Level...
View ArticleCloud and vulnerability management: Avoiding the security stumbling blocks
Security is a big challenge for many businesses. The growth in data breach stories in 2015 proves that companies of all sizes can be successfully attacked. From small organisations like Ashley Madison...
View ArticleDefending your business against cybercrime
The UK crime rate recently doubled after the ONS included cybercrime in its calculations for the first time, showing that cybercrime is a real and present danger. Businesses everywhere are rightly...
View ArticlePrivacy Shield: How businesses should navigate the new cyber security regulation
What’s in a name? When it comes to cyber security and public policy specifically, the answer appears to be: quite a lot. It announces opinion and cements commitment. The most recent example is of...
View Article7 steps to a successful cyber attack
While it is true that pretty much every network is vulnerable to a cyber attack, it is also the case that attackers must follow a certain formula of actions to compromise these systems. Industry...
View ArticleWhat are the hot topics on the conference floor this year at RSA?
RSA Conference 2016 is currently taking place in San Francisco, with events planned in Singapore and Abu Dhabi later in the year. Here, we take a look at some of the hot topics being discussed on the...
View ArticleSecurity in the healthcare sector stuck in the Dark Ages
“The healthcare sector is a good 10 to 15 years behind the retail sector when it comes to security.” This is the disturbing revelation from medical device security advocate, Scott Erven as reported by...
View ArticleBromium survey: Endpoints are the worst and security pros are sick of stupid...
Bromium, the micro-virtualisation specialists from California, has just released the results of a survey conducted at RSA 2016 with some surprising results. Users take note! Asking 100 security...
View Article