Sarah Hayward-Turton
off

Risk Strategies: The Requirement for Resilience in the Retail Sector

Some retailers might be finding themselves hankering after the good old days when, from a security perspective, in-store theft was the major threat posed to their business. The threat landscape is continually changing and, while in-store crime is still a major issue, retailers...
Posted On 20 Jan 2020
off

25% of PCs “more vulnerable to ransomware from January 2020” warns Veritas

PCs still running Windows 7 when the operating system reaches end of life on Tuesday 14 January will be significantly more at risk of ransomware, Veritas Technologies has warned. According to experts, 26% of PCs are expected to still be running the Microsoft software after...
Posted On 07 Jan 2020
Anthony Perridge
off

Effectively Managing Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure around the world and compromising the Industrial Control System and the Supervisory Control and Data Acquisition systems that control these infrastructures, writes Anthony Perridge. In 2010, the Stuxnet worm infiltrated...
Posted On 12 Sep 2019
Patrice Puichaud
off

How Does Ransomware Work?: Beating the Cyber Criminals

Threats come and go, but one thing remains the same: the ability of cyber criminals to adapt to circumstances. A brief decline of interest in ransomware as criminals focused their attention on cryptojacking during the previous year appears to have come to an end and ransomware...
Posted On 29 Aug 2019
off

High-profile GDPR fines “having greatest impact” on UK cyber security spend

Research conducted by data security company Clearswift has highlighted that the recent large General Data Protection Regulation (GDPR)-centric fines levied against enterprise giants British Airways (BA) and Marriott International have had something of a ripple effect on...
Posted On 28 Aug 2019
off

From Firewalls to Fine Grain Permissions: Cyber Security Best Practice

Cyber crime is now so prevalent that guarding against it should be part of standard ‘business as usual’ company procedures, but many organisations have been – and continue to be – caught out. In parallel, the risk of physical attacks remains the same, which means that the risk...
Posted On 26 Jul 2019
off

Law enforcement agencies across EU prepare for major cross-border cyber attacks

The possibility of a large-scale cyber attack having serious repercussions in the physical world and crippling an entire sector or society is no longer unthinkable. To prepare for major cross-border cyber attacks, an EU Law Enforcement Emergency Response Protocol has now been...
Posted On 19 Mar 2019
off

“Legacy applications pose serious cyber security risks to hospitals” warns BridgeHead Software

A new White Paper entitled: ‘Legacy Applications: A Healthcare Cyber Security Nightmare’ has been co-authored by clinical and cyber security consultancy AbedGraham and healthcare data management specialist BridgeHead Software. The document explores the far-reaching...
Posted On 04 Mar 2019
off

2018’s Major Security Breaches: How They Could Have Been Avoided

2018 was a year of both highs and lows for information security, asserts Guy Bunker. The enforcement of the EU’s General Data Protection Regulation (GDPR) took full effect in May which brought the importance of protecting sensitive customer data to the forefront of people’s minds...
Posted On 11 Feb 2019
off

Institute of Risk Management professionals identify key risks on horizon for 2019

Cyber security, Brexit, geopolitics and financial market fluctuations are among the chief concerns for businesses voiced by some of the UK’s leading risk experts as they look ahead to 2019. Senior members of the Institute of Risk Management (IRM) have identified key risk areas...
Posted On 15 Jan 2019