dcsimg

Microsoft suffers data breach affecting webmail accounts

Microsoft has confirmed that a number of its email services have been breached, with users’ email content potentially exposed.  The tech giant noted in its incident statement on 12 April that the criminal hackers could have viewed email addresses, folder names and email subject lines, but … [Read more...]

The most common causes of data breaches and how you can spot them

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident?  According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered within this timeframe was $5.99 million (about €5.3 million), but if it takes longer, the average rises to … [Read more...]

Are you aware of your organisation’s cyber security vulnerabilities?

With 557 reported data breaches in 2018, it’s safe to say that cyber security should be a top priority for all organisations.  Most organisations are already well-aware of this threat and are pouring money into their security budgets. Gartner estimates that worldwide cyber defence spending could hit $114 billion (about €102 billion) in 2019, as organisations … [Read more...]

Are you aware of your organisation’s cyber security vulnerabilities?

With 557 reported data breaches in 2018, it’s safe to say that cyber security should be a top priority for all organisations.  Most organisations are already well-aware of this threat and are pouring money into their security budgets. Gartner estimates that worldwide cyber defence spending could hit $114 billion (about €102 billion) in 2019, as organisations … [Read more...]

Norsk Hydro hit by “severe” cyber attack

Aluminium manufacturing giant Norsk Hydro was forced to switch to manual operations following a “severe” ransomware attack on Monday, 18 March.  The Norway-based company, which employs more than 35,000 people in 40 countries, was reportedly hit with ransomware known as LockerGoga.  Several of its plants around the world … [Read more...]

The 6 most common ways data breaches occur

The first step towards cyber security is identifying how data breaches occur and the level of risk each one poses.  To help organisations do this, Verizon conducted a year-long investigation into the leading causes of data breaches, publishing its findings in its 2018 Data Breach Investigations Report.  In this blog, we break down … [Read more...]

6 must-have information security policies

Information security policies are an often-overlooked part of an organisation’s defence measures. An effective policy informs the way employees handle cyber security threats, ensures that they use defence technologies properly and indicates board-level support for cyber security.  In this blog, we outline six essential information … [Read more...]

3 essential controls that can keep your organisation safe from cyber threats

Organisations that want a proven, structured approach to information security should look no further than ISO 27001. The Standard describes best practice for implementing and maintaining an ISMS (information security management system), which is built around a system of controls that protects your information from a wide variety of threats. The full list of controls is listed in Annex A of … [Read more...]

Securing 2019 with ISO 27001

2018 was a mixed bag for information security. According to the Identity Theft Resource Center’s 2018 End-of-Year Data Breach Report, there were fewer recorded data breaches compared to 2017, but there was a 126% increase in the number of breached records. As you might expect, the business sector suffered both the most data breaches (571 of 1,244 total) and the highest number of breached … [Read more...]

Top 5 tips for tackling the rising threat of data breaches

Cyber security is a daunting topic. Every week there’s a new big data breach, experts are constantly warning that “you’re next”, and the threat of fines and other disciplinary action under the GDPR (General Data Protection Regulation) lingers over all of us. To help you understand how to address these issues, IT Governance Director Steve Watkins gave us his top five tips for staying … [Read more...]