In light of the recent discovery that the University of Calgary paid $20,000 to regain access to its data after a ransomware attack, there below a comment from David Emm, principal security researcher at Kaspersky Lab. David Emm, Principal Security Researcher at Kaspersky Lab: “The recent news that the University of Calgary has paid $20,000 to regain access to its data is another example of how terrifying a ransomware attack can be for a large organisation. The university will of course be holding sensitive information about its students and staff and will have made it a priority to keep it safe, no…
Author: ISBuzz Team
A day doesn’t go by without finding out about another corporate cyber breach that has resulted in the loss of confidential information. These breaches create a huge amount of damage to businesses – both reputational and financial. A recent study released by PWC reveals that the cost of a security breach for a small business can amount to £311k while a large organisation can suffer damages of over £3.14m when such an incident occurs. Furthermore, as the cyber threat landscape is continuously evolving, there is no silver bullet for protecting a business from cyber-crime. Therefore, it is essential to acknowledge…
In response to the news that the UK voter registration website crashed shortly before yesterday’s deadline for the EU referendum due to ‘unprecedented demand’, causing an extension of the legal deadline, below the comments from Ron Symons, regional director at A10 Networks, on the repercussions. Ron Symons, Regional Director at A10 Networks: “IT managers should always plan ahead and equip their systems to deal with massive demand before it hits. Burying your head in the sand and hoping that your systems will cope is simply no longer enough. “The collapse of the government’s voting registration website during this period of intense…
It has been two weeks since ESET found out that TeslaCrypt ransomware closed down its operations. Since then, there is another player in the game, showing an even higher level of prevalence – namely Win32/Filecoder.Crysis. ESET created a TeslaCrypt decryptor that allows ransomware’s victims to get their files back. Over 32.000 users around the globe have already taken this opportunity and downloaded the tool. But even with TeslaCrypt abandoning its territory, malware extortion families have lost none of their prominence amongst cybercriminals. With unceasing waves of JS/TrojanDownloader.Nemucod and JS/Danger.ScriptAttachment trying to download several variants of Locky, affecting Irish users as well, it would seem that this ransomware…
Jeff Harris, vice president, solutions marketing at Ixia explores best practices for establishing a security architecture that is both robust and delivers high availability. If you are planning an upgrade or migration to next-generation firewalls (NGFWs), it is not just an opportunity to gain richer functionality and a wider range of protections. It is also an excellent time to review your entire security architecture; to ensure it maximizes the value and efficiency of all your security devices, while minimising the risk of network downtime. This latter point is particularly compelling, as analyst firm Gartner states that the average cost of downtime across a range of industry…
Joanne Godfrey, Director of Communications and Strategy at AlgoSec looks at the problems caused by organizations’ mostly manual security processes, why automation can solve them, and drive organizational change Security management has gotten out of hand, according to our recent State of Automation in Security Report. 48% of survey respondents had an application outage as a result of a misconfigured security device, 42% experienced a network outage, while 20% suffered a security breach. And on average, these issues took up to three hours to fix, while 20% of organizations needed a day or more to fix the problem. Security teams have to take…
Almost 14,000 online social media posts relating to UEFA Euro 2016, posted over one week, have made reference to the public concern for security at this year’s tournament, according to new research by Crisp Thinking, experts in social media risk defence. “With the majority of European cities on high alert for terrorism it is unsurprising that the wider web and social media are reflecting this concern,” said Caroline Skipsey, Head of Social Media Risk & Reputation at Crisp Thinking. “We’re now seeing law enforcement take action based on social media posts, which is increasingly being used as a source of…
Following the news that a number of popular websites, including Netflix and Facebook, are sending password reset emails to customers whose credentials match previous major breaches (LinkedIn, MySpace and Tumblr), there below the comment from Richard Parris, CEO at Intercede. Richard Parris, CEO at Intercede: “While it’s positive to see high-profile companies such as Netflix and Facebook actively resetting users’ passwords that could have been compromised, the reality is that the security efforts of these organisations do not go nearly far enough. These websites hold masses of sensitive personal data about millions of consumers, and should not be relying on outdated passwords which are no longer fit…
Following the news that the EU referendum registration website crashed under the weight of 525,000 applications last night, there below the comments of Jonathan Birch at Redcentric on how organisations can ensure such outages can be prevented, especially in instances where it is so apparent traffic peaks should be expected. Jonathan Birch, Product Manager at Redcentric: “Technology is everywhere and businesses and consumers alike will admit they couldn’t get by without it. It’s unsurprising then that when data outages occur it results in outcry – business brand names are dragged through the mud, which can be hard to come back…
Research – Cloud Adoption Can Increase Risks to Employees and Organisations LONDON, UK. Blue Coat Systems, Inc. a leading provider of advanced web security solutions for global enterprises and governments, today revealed the initial results from an online study conducted by YouGov of 3,130 workers in various industries across Britain, Germany and France. The research offers a detailed look at how workers use cloud applications such as Dropbox, Box, Office 365, Slack, LinkedIn, Facebook and Gmail today safely, and otherwise. Workers across Europe are leaving businesses vulnerable to the leaking and misuse of sensitive data on a scale most organisations might…