Research shows 90 per cent of businesses had security breaches in the last year Intel Security latest business to join UK cyber security scheme as more than 1,000 businesses now accredited £1/2m fund to help develop cyber security skills UK businesses were warned about the growing risk of cyber attacks as Minister for the Digital Economy, Ed Vaizey, urged businesses across the country to protect themselves by taking up the Government’s Cyber Essentials scheme. Whilst businesses are reaping the benefits of operating online and now earn £1 in every £5 from the Internet, cyber attacks are now considered a serious…
Author: ISBuzz Team
Following the news that Symantec fired 3 employees after Google’s engineers found rogue SSL certificates issued in its name, please find comment below from Kevin Bocek, VP of Security Strategy and Threat Intelligence, Venafi. [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Bocek, VP of Security Strategy and Threat Intelligence, Venafi : “Rogue SSL certificates in the wild? This is nothing new. Certificate Authorities (CAs) are constantly being bombarded to issue new certificates for bad guys looking to spoof websites and execute Man-in-the-Middle attacks. While it appears these certificates we’re not obtained by fraud or meant to do harm, the response and reaction from Google to…
You may have seen news that crime levels are predicted to soar by 40%, when the new estimates around the scale of fraud are to be included in official statistics for the first time. New statistics will be published which capture victim’s experience of cybercrime and identify theft in particular. With the rise of the internet, the nature of crime has changed significantly and individuals must be educated on how to thoroughly protect their identities online. Hans Zandbelt ,senior technical architect at identity commented on why two-factor authentication and replacing passwords is but one crucial element in the effort to…
[su_box title=”About TSG” style=”noise” box_color=”#336588″]With experienced specialists across all areas of technology from infrastructure to telecoms, CRM to ERP, business intelligence to SharePoint, TSG is one of the UK’s leading IT support companies, trusted to apply best practice for thousands of organisations, businesses, charities, schools and colleges large and small.As consumers of IT have become increasingly well-informed, our focus is on a knowledge-based approach to implementation and the immense benefits that ‘repeatability’ and best practice yield.Our personal approach for every valued customer ensures that we build seamless technology environments that protect your data, reduce downtime to an absolute minimum, and…
Following reports that apps in the Apple App Store in China were hit with malware dubbed XcodeGhost, Mark Noctor director, EMEA sales at mobile application security provider Arxan commented on the ‘XcodeGhost’ attack on Apple’s App Store. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark Noctor, Director of EMEA Sales at Mobile Application Security Provider Arxan : “The XcodeGhost attack is just one illustration of how easily applications can be modified and then maliciously packaged to unknowingly steal sensitive data or do other nefarious things. The question is not how this happened – exploits on applications will certainly continue, if not accelerate. The real question…
This year, disaster recovery (DR) has been a top priority for 45 per cent of UK IT departments. With the increase in legal and regulatory compliance coupled with virtualisation and cloud-based strategies for disaster recovery, more IT departments (5 per cent more than 2014, to be exact) are recognising the importance of DR. But knowing DR is necessary and implementing it effectively are two separate things. In a separate study by Timico, only 5 per cent of respondents said they were totally confident that their DR plan was adequate. UK businesses face both man-made and natural disaster such as software…
When you’re looking for an IT solutions company in the Philippines that can offer IT security services, then you have one big question swirling in your head: “Is it worth it to let other people manage my sensitive data and give my company a competitive advantage?” According to a growing number of companies, the answer is a yes. IT research firm, Computer Economics, recently published a report called “IT Outsourcing Statistics 2015/2016,” where it has been found that more and more companies are outsourcing their IT functions. Of the organizations surveyed in the study, the largest of these—meaning those with…
Security experts from Lancope and VASCO commented on the latest news that hackers infiltrated the vaunted Apple ecosystem by injecting malicious software into popular Chinese mobile apps. [su_note note_color=”#ffffcc” text_color=”#00000″]Gavin Reid, Vice President of Threat Intelligence, Lancope : “Before this unfortunate incident the Apple App Store had the industry-leading track record releasing more than a million apps with only 5 known bad. This is due to their strong application verification process – contrast that with open Android policy resulting in daily malware. In this case there is little the user can do to protect itself. The fix for this is…
The Apple Watch, the Moto 360, the Samsung Gear. Whether you have a fixed BYOD policy or not, these wearable technologies are already communicating through your corporate network on a daily basis, working seamlessly to collect and deliver data to employees on the move. As a matter of fact, IDC predicts that by 2019, more than 89 million smart wearable units (including smart glasses, hearables, and fitness and health trackers) will ship worldwide. That’s more than double the 2015 estimate of 33 million. What started out as fun consumer devices are also now offering a vast number of applications targeting…
Kevin Epstein, VP of Threat Operations at Proofpoint commented on the news that bitcoin payment processor BitPay has lost $1.8 million following a phishing attack against the company’s executives. [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Epstein, VP of Threat Operations at Proofpoint : “Hackers continue to use spear-phishing to initiate attacks because it works; as Proofpoint’s Human Factor research has shown, eventually everybody clicks. From a social engineering standpoint, a phishing email is far more likely to succeed in tricking the recipient into enabling malware or revealing proprietary information if it appears to come from authorized managers, such as this hacker posing as the…