The Economist recently found the best way to ensure employees are “engaged” is to give them more control over where and how they do their work. So it is no surprise that one in seven people now work from home within their full time roles. Meanwhile even those who are primarily office-based regularly have to travel for work, yet also must stay connected to their workplace when they do so. It has therefore become a necessity for businesses to ensure employees are able to work efficiently and effectively when they aren’t in the office. However, do businesses have the tools to support the productivity…
Author: ISBuzz Team
The Information Commissioner’s Office (ICO) has released a new report into a data breach by Wolverhampton City Council in which the payroll of almost 10,000 people was accidentally sent to an external recipient. Justine Cross, regional director at Watchful Software. Justine Cross, Regional Director at Watchful Software: “The ICO’s latest report following a breach at Wolverhampton City Council demonstrates that local authorities and other organisations need to shift their data handling policies beyond training. Emailing the wrong recipient is the most common digital cause of data security incidents reported to the ICO, and even a well-trained, vigilant employee can make that split-second mistake. “While…
Numerous data breaches compounded with the huge market for stolen data highlight the need to rethink the entire concept of the password The recent news of an iPhone bug that allows hackers to steal passwords with just a text message should serve as a stark reminder about the huge market for stolen user credentials and the vulnerability of passwords. This is according Secure Cloud Link, who argue that organisations and individuals must realise that passwords are now an untenable means of authentication and present a major security risk. The security bug, which has now been repaired, meant that hackers had the…
Disaster recovery specialist Databarracks has launched a new DR service designed specifically to target cyber threats. Cyber-Disaster Recovery as a Service (Cyber-DRaaS) identifies cyber-attacks early and enables users to roll back to the last clean replication point in Databarracks’ secure DR environment. Peter Groucutt, managing director at Databarracks, explains: “As a business continuity provider, we have a very unique view of cyber threats. We are called into action when defences have been breached and we need to get a customer back up and operating as quickly as possible. Cyber threats like ransomware and malware are the fastest-growing concern we hear…
Search social media and delve into the dark web and you can find all sorts of useful data. James Parry, Technical Manager for Auriga, looks at how businesses can tap this mine of information to learn of impending attacks. Like any social construct, the Internet has its dark and seedy side. From social media to encrypted chat rooms and the black markets of the deep web, there’s a whole world out there lying just beneath the shiny surface of the Internet and it’s here that many cyber attacks are born. The majority of successful attacks carried out against businesses are…
Reports are starting to surface saying that a hacker has targeted the official forum of popular mobile game “Clash of Kings,” making off with close to 1.6 million accounts. The hack was carried out on July 14 by a hacker, who wants to remain nameless, and a copy of the leaked database was provided to breach notification site LeakedSource.com, which allows users to search their usernames and email addresses in a wealth of stolen and hacked data. In a sample given to ZDNet, the database contains (among other things) usernames, email addresses, IP addresses (which can often determine the user’s location), device identifiers,…
Goal is to provide car manufactures with guidelines for protecting modern vehicles against emerging cyber threats The Automotive Information Sharing and Analysis Center (Auto-ISAC) has released a set of cybersecurity best practices for connected vehicles. The document, developed over the course of five months by a group of more than 50 cybersecurity experts from the auto industry, is designed to demonstrate the collective commitment by automakers to make modern cars safer against emerging cyber threats. The best practices cover seven broad areas, including governance and accountability, risk assessment and management, secure design practices, threat detection and mitigation, and incident response. In each case…
It has been reported that several websites owned and operated by the United States Congress are recovering from a three-day DDoS attack. The campaign began on July 17 when the websites for the Library of Congress began experiencing technical difficulties. A day later, the websites went temporarily offline. During the attack, Library of Congress employees were unable to access their work emails or visit any of the Library’s websites. It is reported that the attackers overcame the initial defence measures to escalate their campaign. Stephen Gates, chief research intelligence analyst at NSFOCUS, provider of advanced security solutions and DDoS mitigation specialists commented below. Stephen…
In response to recent developments of the Investigatory Powers Bill otherwise known as the ‘Snoopers Charter’, Richard Stiennon, Chief Strategy Officer at Blancco Technology Group commented below. Richard Stiennon, Chief Strategy Officer at Blancco Technology Group: “On the one hand, I can see why law enforcement officials would be in favour of having access to a year’s worth of data on people’s emails, phone calls and web activities because it could help them solve criminal cases. But at the heart of this legislation is a bigger issue. How long is it acceptable to store user data? And could holding onto data…
A new report has just been released by the Office for National Statistics which found that nearly six million fraud and cyber-crimes are committed every year mostly related to bank fraud. It estimated there were two million computer misuse offences and 3.8 million fraud offences in the 12 months to the end of March – suggesting fraud is the most common type of crime. Most related to bank account fraud. Robert Capps, VP at NuData Security, an award winning behavioural biometrics company and fraud mitigation specialists commented below. Robert Capps, VP at NuData Security: “What’s very apparent is that card fraud is thriving and it…