In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.
The average person today has become profoundly more technical, utilising a variety of devices, technologies and cloud solutions in their daily lives. Whether a person is backing up photos to iCloud or logging into social media from an iPad or smartphone, the average security perimeter of an individual has moved far beyond email address, laptops and a favourite website.
There's no predicting when a cyber attack might come, whether it be in the form of a DDoS, a virus, malware, or phishing. It's therefore important to be constantly vigilant, and prepared for incidents when they do occur.
Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.
Decoding the minds of hackers means we're developing the best solution to real life circumstances.
We'll be OK, right? Wrong. Like it or not, the threat is all around us. And growing. It's no longer the isolated, odd geek in his bedroom who lives on a diet of pizza and computer code. Today, it's about power and money with both things driving an explosion in the number of active hackers.
From an early age, we're taught not to take candy from strangers. Our parents drill a suspicion of the unknown into us, arming us with the tools to keep ourselves safe. But when it comes to the online world, grown adults who should know better throw caution to the wind, handing over all kinds of intimate data in exchange for use of a free app or wifi network.
Beauty and The Beast set me up with some unrealistic expectations of my household furnishings. Whilst the Internet of Things (IoT) may not yet have given candelabras a quippy sentience, it has given standard home fixtures a secret life. However, this isn't quite the heart-warming picture Disney painted for us.
Perhaps the question for everyone today is not 'why hack?' but rather what's your hack? In a time of extreme instability and change, perhaps the smartest place to be is one that welcomes interruption and self-review
So I ask you, how is riding a bike any different from using the internet? We need to nurture our children, explain right from wrong, make them aware of the dangers lurking around every corner and to always think
All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why should cyber security be any different? The purpose of a Security Playbook is to provide all members of an organisation with a clear understanding of their responsibilities regarding cyber security - before, during and after a security incident.
Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...
Children say and do the stupidest things. Adults say and do even stupider things. But no one says and does stupid things in quite the same way as cele...
Data is supposed to be the new oil, powering all industries and underpinning major business decisions. That said, ask any Tom, Dick or Harry on the street what the word data means to them and they are likely to draw a blank.
By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.
Every post you make, every breath you take, every search you make, they'll be watching you. Every bit of information you have ever entered anywhere online is stored, collated and held. For the most part, we give this data over without even thinking about the consequences, assuming it is safe.