Data Breaches

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

Creating An Effective Cyber Security Response Plan

John Worrall | Posted 23.11.2016 | UK Tech
John Worrall

Organisations plan for success. They should also plan for worst case scenarios - especially in the case of a cyber attack or breach. For many organisations, preparedness means developing plans for disaster recovery and continuity of operations.

How Artificial Intelligence And Analytics Deal With Insider Threats

Ben Dickson | Posted 18.11.2016 | UK Tech
Ben Dickson

These are insider threats, the number one contributing factor to security incidents within enterprises. Despite what you see in hacker movies such as Blackhat, the biggest threat to organisations' networks are the people who are working for them.

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

The Cost Of Data Breaches Will Get Even Higher

Alastair Paterson | Posted 24.10.2016 | UK Tech
Alastair Paterson

Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.

What Cybersecurity Experts Can Learn From The Gaming Industry

Ben Dickson | Posted 21.10.2016 | UK Tech
Ben Dickson

The cybersecurity industry seems to be heading toward dire straits as data breaches grow in size and number every year, while in tandem, monitoring networks is becoming ever more challenging with internet traffic increasing at an accelerating pace.

How To Keep The Fraudsters At Bay

Gad Elkin | Posted 21.10.2016 | UK Tech
Gad Elkin

In order to prevent online fraud, it is important for businesses to recognise where their infrastructure is most vulnerable, educate employees effectively and work with the right partners to keep up with an evolving cyber security landscape.

Digital Economy Bill: A Data Sharing Dunce

Renate Samson | Posted 11.10.2016 | UK Politics
Renate Samson

We hope that the Committee scrutinising the Bill are brave enough to acknowledge that Part 5 is an old fashioned approach to a very modern problem. Rather than amend Part 5, we hope they send it back from where it came and push for a rewrite so that this legislation can be meaningful rather than meaningless.

The Biggest Data Breaches of 2015

David Emm | Posted 15.12.2015 | UK Tech
David Emm

This year has seen a steady stream of security breaches, so much so that the news announcements almost seem routine. It's hardly surprising though, as our personal information is such a valuable commodity - not just for companies, but unfortunately for cybercriminals too.

Songkick Respond After Adele Ticket Buyers Report 'Data Breach'

The Huffington Post UK | George Bowden | Posted 02.12.2015 | UK

Ticket website Songkick have responded, following complaints from Adele ticket purchasers, who reported seeing other people's personal data, including...

How to Protect Yourself Against the Hackers

Gary Newe | Posted 02.09.2016 | UK Tech
Gary Newe

The number of data breaches has continued to grow in 2015. Barely a day goes by without a company or country falling victim to a cyber-security attack. Some of the high profile attacks we've witnessed this year include Github, Uber, and Chris Froome's personal training data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 27.08.2016 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Keep Up or Get Caught Out - Lessons From the Ashley Madison Hack

Gary Newe | Posted 24.07.2016 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

Big Data: Businesses Must Remember to Take Out Their Rubbish

Nick Patience | Posted 11.11.2013 | UK Tech
Nick Patience

In the wake of revelations and consumer backlash against PRISM, big businesses around the world are coming under increasing pressure to give users more insight into and guarantees about how they are using their data.

Government throws spotlight on small firms in fight against cybercrime

Mike Foreman | Posted 06.07.2013 | UK Politics
Mike Foreman

Cybercrime remains one of the greatest threats to UK business. Latest government figures calculate that it costs the country £27bn each year, with £...

Children Of The Digital Revolution

David S. Gibson | Posted 21.05.2013 | UK Tech
David S. Gibson

In a single generation, digital collaboration has completely changed the way we communicate and work. Ubiquitous connectivity and digitized information may be the most significant global change to take place since the transportation revolution.

Government's Communications Bill - Licence to Snoop?

Gary Hibberd | Posted 16.02.2013 | UK Politics
Gary Hibberd

My concern is not about the rights of official bodies having access to this information. Rather it is the ability of these organizations to hold such vast amounts of data securely coupled with the idea that a Draft Communications Bill can be written without any real consideration around the practicalities of its implementation.

Small Firms Need Support and Education to Protect Against Data Breaches

Robert Guice | Posted 22.09.2012 | UK
Robert Guice

Small and medium sized enterprises in the UK do not see information security as an important issue, yet the risk of data breaches has never been higher.

'Hacktivists Steal More Data Than Criminals' Claims US Security Report

Huffington Post UK | Michael Rundle | Posted 22.03.2012 | UK Tech

Political hacking groups such as Anonymous were responsible for more than half of all records stolen through data breaches in 2011, a report has claim...