Dubbed ‘the year of the breach’, 2014 saw information security breaches increase among small and large businesses at an exponential rate. According to figures published by PwC in its Information Security Breaches Survey 2015, 90% of large organisations and 74% of small businesses suffered a security breach last year. Ranging from malicious email attacks designed to infect and disable a network to data theft, the methods of infiltration are growing more sophisticated and, with the financial impact to recover from such attacks continuing to rise, the cyber security sector needs to respond. So what are the lessons to be learned…
Author: Ryan Farmer
Maintaining online data security is one of the biggest challenges facing businesses – especially as flexible and mobile working now sees employees accessing information from a range of locations. No company can afford to appear unreliable when it comes to cyber security. Here are four ways to promote its importance among all of your staff, rather than just those employed in information security jobs: Provide a written policy You cannot expect your staff to be conscious of cyber security practices if you don’t have a written policy in place that they can follow. Thus, the first step to promoting security…
The interconnected network of electronically embedded objects or devices, referred to as the Internet of Things (IoT), is on the rise within both businesses and homes in the UK. It was the subject of a recent report by application testing technology firm Veracode, and the company found that it presented very real implications for personal and corporate cyber security. During the course of researching this investigation, the IT security management specialists at Veracode looked at several devices common to the IoT – such as the Wink Relay, the Wink Hub, the Chamberlain MyQ Internet Gateway and the SmartThings Hub –…
Over two months after the attack by hackers on Sony Pictures, the cyber security landscape is still very much in the public eye. With notable hacks reported every week, firms big and small as well as governments are having to respond. Many of them are taking their lead from the US response to the Sony hack. The Western Front The Sony hack took place on 22nd November, when the firm’s computer systems were hacked. The perpetrators stole sensitive data, including embarrassing emails about staff and stars. A media storm was kicked up as personal conversations about Hollywood actors were revealed, while…
Hacking has started 2015 much as anyone in the cyber security industry would have expected. From US Military Command accounts to phone calls, it seems that nothing is untouchable. In much the same way, the computer games industry is also a valid target for cyber criminals. Hacking around the Christmas tree The vulnerability of games consoles to hacking has been highlighted a number of times in recent years, though this was clearly showcased on Christmas Day. With hundreds and thousands of people waiting with eagerness to put their new Xboxs and Playstations to the test, they found they could not –…
Cloud computing has, in the past few years, become a viable alternative to in-house server-based solutions.
Consequently, a business owner needs to make sure they have the best possible anti-virus software guarding their IT infrastructure.
When interviewing for an IT security role, this socially awkward situation is enhanced by the nature of the role.
Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
The unfortunate breaches of information security defences during 2013 confirm that IT security professionals will be in demand for a long time to come.