In the midst of the most significant changes to data protection in the EU since 1995, ninety-seven per cent of UK consumers still don’t know what happens to sensitive information they give to call centre operatives over the phone, according to a new survey by Elitetele.com. When asked to describe what happens, over a third (36 per cent) stated they had no idea and almost two thirds (61 per cent) incorrectly identified what information operatives have access to and how it is stored. With many businesses looking to provide new ways to unify communications and give staff more flexible working…
Author: ISBuzz Team
Barracuda Web Application Firewall Protects Three Types of Azure Apps – Web Apps, Mobile Apps, and API Apps Press Release Highlights: Barracuda tightens relationship with Microsoft Azure to offer customers advanced security and flexibility for their public cloud deployments. Barracuda Web Application Firewall is the only web application firewall available in Microsoft Azure that protects web apps, mobile apps, and application program interface (API) apps developed through the Azure App Service. Customers creating web and mobile apps with Azure App Service can easily integrate an additional layer of security in the Azure environment using the Barracuda Web Application Firewall. Barracuda…
UK cities and businesses are being encouraged to apply for a £10m fund in a competition that will revolutionise the way the Internet of Things (IoT) benefits citizens by offering environmental improvements, economic opportunities, and more efficient and effective delivery of services such as transport, healthcare and energy. The Department for Culture, Media and Sport (DCMS) and Innovate UK are offering up to £10 million for a single collaborative research and development project to demonstrate the capability of IoT in a city region. The competition is part of a wider £40 million government investment in IoT announced in March 2015.…
Two further critical Flash zero-day vulnerabilities have been found, thanks to leaked data from the Hacking Team breach. All current versions of Flash are impacted. Here to comment on this news are security experts from Tripwire. Tim Erlin, Director of IT Security and Risk Strategy, Tripwire : “If Hacking Team had these exploits, and was keeping them unpublished, then it’s likely other hacking organizations did as well. The real challenge with these ‘zero-day’ vulnerabilities is that we know they’ve been available and used by a smaller community already, which means that attackers may have already exploited them and gained a foothold…
Will Mastercard’s selfie verification idea revolutionize how consumers secure their online transaction processes? What began as an idea by one credit card company could mark as the next big solution to online payment security. New data from Acquity Group and Walker Sands shows the value consumers place on payment security, supporting the potential for Mastercard’s selfie verification idea in reaching mainstream adoption: Retailers will lose one-fifth of their customers (21%) from not offering enhanced payment security measures such as a finger print or other biometric sensors for mobile shopping (Acquity Group’s 2015 Next Generation of Commerce Study) Nearly 1 in 5 shoppers (19%) have been the victim of fraudulent purchases as a result of…
At least 21 million Social Security number have been exposed in the second hack of the federal government. The first hack happened last month and exposed a separate 4.3 million Social Security numbers. The hackers also had access to 1.1 million sets of fingerprints as well as other sensitive information such as addresses, drug and criminal history, financial history, etc. Following this news, Mike Smart, Security Strategist, Proofpoint discusses whether normal people should be worried about such attacks. Mike Smart, Security Strategist, Proofpoint : “Organisations of any size are a target to advanced attacks. These recent examples remind us there…
Risk of successful attacks on untrained staff could soar as suspect URL’s see 87% growth Recent research has shown that companies are underestimating the risk of failing to provide security training to non-technical staff. In its latest report, Intel Security warns that IT security training for non-technical staff cannot be overlooked. The study, which surveyed IT decision makers in European-based companies[1], found that within UK companies, sales staff are the most exposed to online attacks. This is thanks to their frequent online contact with non-staff members. Incidentally, they were closely followed by the call centre and customer services teams –…
The data managed by organisations is set to increase by 76 per cent over the next 12 to 18 months[i]. This, coupled with emerging types of data, means Information Governance strategies are becoming a significant challenge for businesses. The adoption of social and collaborative platforms means businesses must incorporate social media posts, texts, instant messages and online file sharing into the formal processes that manage information, all while considering security, compliance and employee behaviour. This poses vast complexities, as many face difficulties when attempting to apply existing rules to information types that are unstructured, considerable in volume and difficult to…
Bringing much needed transparency to global Enterprise Services purchasing The end of July sees the launch of a unique business intelligence product developed by blur Group that enables organisations to gain invaluable insight into global business services trends and market information. blur Data is an online dashboard providing businesses with a first-of-its-kind industry overview of key trends in business services e-commerce – with insights into geographical focus, technology and industry verticals. Armed with blur Data, businesses can monitor trends and demand fluctuations for a large array of business services, revealing which technologies are on the rise, what the must-have feature…
Systems integrators can now use Centrify’s identity management platform to securely provision and deploy Office 365 and other SaaS applications Centrify Corporation, the leader in securing identities from cyberthreats, has announced a new category in its channel partner program specifically designed for system integrators and consulting partners. As part of the new category, Centrify is actively recruiting national system integrators and consulting partners to support and accelerate the deployment of SaaS applications, including Office 365. Customers of all sizes are rapidly moving to the cloud. However, challenges around provisioning users and applications combined with identity integration pose some of the biggest obstacles to…