dcsimg

How to transition to ITIL 4

If you work in IT, you’ll probably have come across ITIL®, the globally recognised framework that helps organisations manage their ITSM (IT service management) requirements.  The framework is updated regularly to make sure it’s suitable for the ever-evolving IT industry, and in 2019, the latest version, ITIL 4, was released.  The changes were a result of ITIL’s owner, AXELOS, conducting more than … [Read more...]

Frankfurt’s IT networks grinds to a halt amid Emotet attack

The week before Christmas, Frankfurt saw the unwelcome return of Emotet, a banking trojan that recently came out of hiding to terrorise organisations across the globe.  The malware spread through the city’s systems, forcing officials to shut down its IT network, causing huge delays to government services.  This is the fourth time in recent weeks that Emotet has struck in Germany, following attacks … [Read more...]

Cyber attacks and data breaches in review: December 2019

In some respects, 2019 ended on a positive note, with a comparatively low 627,486,720 breached records.  That’s about a third of the monthly average, and ensures that the year accounted for only 12.7 billion breached records.  Over the next few weeks, we’ll analyse the information we’ve tracked throughout 2019 and produce an infographic summarising the year’s figures.  In the meantime, here are … [Read more...]

2019 cyber security news in review

At this time of year, news feeds are chock full of Predictions For The Next Year – and for good reason. Everybody wants to be prepared for what lies ahead.  But if you’re looking for guidance on what 2020 has in store, we suggest you follow the maxim that the best predictor of future behaviour is past behaviour.  So, as we enter a new year – and indeed a new decade – let’s take a look back at … [Read more...]

Why your organisation should conduct regular penetration tests

It might sound crazy to the uninitiated, but organisations across the globe pay people to break into their systems and find sensitive information.  The reason they do this is simple: to catch a thief, you must think like one. Organisations hire ethical hackers, otherwise known as penetration testers, to make sure they have someone who’s one step ahead of the tactics that crooks use.    What … [Read more...]

How does ransomware infect organisations?

Ransomware has become one of the most infamous types of cyber crime in recent years, with security professionals and the public alike fearing the prospect of attack.  But although many of us broadly understand how ransomware works – computers are infected with malware, locking users out of their files until they make a payment – there is little in-depth knowledge about why the attacks are so … [Read more...]

One in four organisations were breached in the first half of 2019

It shouldn’t come as a surprise that 2019 has continued a growing upwards trend of cyber crime, but Bitdefender has revealed just how extensive the threat is.  Its Mid-Year Threat Landscape Report 2019 revealed that 24% of organisations suffered a breach in the first half of the year.  Meanwhile, many of those that haven’t reported an incident admit it’s possible that they’ve suffered one but … [Read more...]

ISO 50001: What you need to know about energy management systems

All organisations are looking to gain a competitive advantage. One way of doing this is to use resources more efficiently; after all, less consumption equals lower costs and higher profits.   Of course, responsible energy consumption has proven easier said than done over the years, even with growing public and government interest in pollution.  The fact is organisations need electricity and, in … [Read more...]

Is your CRM (customer relationship management) system GDPR compliant?

Organisations that use a CRM (customer relationship management) system will have plenty of experience handling large volumes of personal data, which can be both a good and bad thing when it comes to the GDPR (General Data Protection Regulation).  On the one hand, they’ll be familiar with the importance of keeping information such as names, email addresses and dates of birth secure, and updating or … [Read more...]

Worried about data breaches? Check out our 8-step incident response guide

The key to a successful cyber security strategy is preparation. If you have a plan for how to manage data breaches and other disruptions, you can get to work on remediation immediately.  And what’s more, everyone in your organisation knows their roles. There’ll be no one wandering around unsure what to do as a crisis unfolds.  Instead, people will turn to management, who can relay instructions and … [Read more...]