dcsimg

July book of the month: A bumper ISO 27001 edition

Every month, IT Governance selects a book of the month from our extensive catalogue of cyber security guides, but this month we’ve been decided that one book just wasn’t enough. That’s why we’ve picked The ISO 27001 Expertise Bundle, which comprises four invaluable guides to help you understand and implement the information security standard.  Here’s an overview of each book and why you … [Read more...]

Online anonymity has allowed cyber crime to thrive

Online anonymity is a complicated topic. There’s no doubt that the elasticity it gives our identities is a massive benefit. We can explore different sides of our personality without affecting the reputation of any other part of us. Unfortunately, that’s also proven to bring out the worst in some of us, with people committing acts online that they would never do in person. Cyber bullying and mob … [Read more...]

What makes ISO 27001 the go-to standard for information security?

ISO 27001 is one of the fastest-growing management standards in the world. with the number of awarded certifications increasing by 20% in consecutive years. In 2016 (the last available figures), 33,290 certifications were issued worldwide, and 27,536 certifications were awarded the year before.  ISO 27001 is clearly very popular, but what makes it the standard for information … [Read more...]

Why you need to report cyber attacks

Once you’ve been hit by a cyber attack, the damage has already been done. There’s no way to make the disruption disappear, so you might suppose it’s best to just get on with things. Reporting the incident to your supervisory authority means extra work and could cause a PR nightmare. Nonetheless, it’s essential that you notify relevant parties of the breach. The attacker is a criminal, and it’s … [Read more...]

1 in 8 cyber attacks successful in Denmark

A recent survey by the Danish Society of Engineers’ IT subsidiary, IDA-it, concluded that two thirds of businesses had experienced a cyber attack, and that up to one in eight cyber attacks carried out against Danish organisations are successful. IDA-it surveyed people working in IT or personal data related roles in the public and private sector. Kåre Løvgren, IDA-it’s chairperson, said that … [Read more...]

What you need to know about Ireland’s newly published 2018 Data Protection Bill

The Irish government has published its highly anticipated 2018 Data Protection Bill. The Bill, which broadly follows the general scheme released in May 2017, incorporates Ireland’s national implementing measures required under the General Data Protection Regulation (GDPR) as well as a new regulatory framework for enforcing data protection laws in Ireland. What you need to know: > The “digital … [Read more...]

Police arrest criminal hacker who stole €1 billion from banks

Spanish police have arrested a Ukrainian criminal hacker who is suspected of heading a gang that stole more than €1 billion from banks around the world. The suspect, who hasn’t been named, used Anunak, Carbanak and Cobalt malware to hack into banks’ computers and manipulate money transfers. Twenty members of the suspect’s gang were also apprehended in a series of arrests across Romania and … [Read more...]

Is your organisation tackling cyber security the right way?

Most organisations’ cyber security defences aren’t good enough. How could they be? Even with unlimited money and staff, it is practically impossible to address the constantly emerging and evolving threats. There are unpatched systems, potential malware infections, the threat of large-scale attacks and any number of vulnerabilities that employees bring with them, from weak passwords to … [Read more...]

Security experts warn health tech is vulnerable to cyber attacks

A Royal Academy of Engineering (RAENG) report has warned that health technology is vulnerable to cyber attacks and that criminal hackers could kill patients by attacking their pacemakers or heart pumps. Experts cautioned that connected health devices, such as pacemakers or wearable health monitors that are linked to the Internet or internal computer networks, could provide a gateway for criminal … [Read more...]

6 reasons why software is becoming more vulnerable to cyber attacks

“Is today’s software more vulnerable?” asks the European Union Agency for Network and Information Security (ENISA). This question was posed shortly after researchers uncovered potentially industry-wide vulnerabilities in 4G LTE protocol, an incident that is far from exceptional. The National Vulnerability Database and the Common Vulnerabilities and Exposures database both recorded more than 6,000 … [Read more...]