dcsimg

DPC launches investigation into Google Ireland

Ireland’s DPC (Data Protection Commission) has launched a statutory enquiry into how Google Ireland processes data for the purpose of advertising.  The probe is the result of a number of submissions to the DPC, including those made by Dr Johnny Ryan, Chief Policy & Industry Relations Officer for Brave, a privacy-focused web browser.   Dr Ryan’s submissions reveal that Google’s … [Read more...]

Senior employees lack accountability regarding cyber security

C-level employees are putting their organisations at risk by neglecting cyber security practices, a new report suggests.  According to McAfee’s Grand Theft Data II: The Drivers and Shifting State of Data Breaches, 61% of respondents believe executives demand greater lenience when it comes to cyber security policies and processes. This includes things such as choosing not to attend staff awareness … [Read more...]

What is business continuity and why is it so important?

The ever-present threat of cyber crime and organisations’ increasing reliance on technology means that business disruptions are inevitable these days. Any day now, your systems could be breached or your physical premises disrupted by criminals, inattentive employees or damaged infrastructure.  When that day comes, you can’t afford to be caught … [Read more...]

Microsoft suffers data breach affecting webmail accounts

Microsoft has confirmed that a number of its email services have been breached, with users’ email content potentially exposed.  The tech giant noted in its incident statement on 12 April that the criminal hackers could have viewed email addresses, folder names and email subject lines, but … [Read more...]

The most common causes of data breaches and how you can spot them

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident?  According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered within this timeframe was $5.99 million (about €5.3 million), but if it takes longer, the average rises to … [Read more...]

Are you aware of your organisation’s cyber security vulnerabilities?

With 557 reported data breaches in 2018, it’s safe to say that cyber security should be a top priority for all organisations.  Most organisations are already well-aware of this threat and are pouring money into their security budgets. Gartner estimates that worldwide cyber defence spending could hit $114 billion (about €102 billion) in 2019, as organisations … [Read more...]

Are you aware of your organisation’s cyber security vulnerabilities?

With 557 reported data breaches in 2018, it’s safe to say that cyber security should be a top priority for all organisations.  Most organisations are already well-aware of this threat and are pouring money into their security budgets. Gartner estimates that worldwide cyber defence spending could hit $114 billion (about €102 billion) in 2019, as organisations … [Read more...]

Norsk Hydro hit by “severe” cyber attack

Aluminium manufacturing giant Norsk Hydro was forced to switch to manual operations following a “severe” ransomware attack on Monday, 18 March.  The Norway-based company, which employs more than 35,000 people in 40 countries, was reportedly hit with ransomware known as LockerGoga.  Several of its plants around the world … [Read more...]

The 6 most common ways data breaches occur

The first step towards cyber security is identifying how data breaches occur and the level of risk each one poses.  To help organisations do this, Verizon conducted a year-long investigation into the leading causes of data breaches, publishing its findings in its 2018 Data Breach Investigations Report.  In this blog, we break down … [Read more...]

6 must-have information security policies

Information security policies are an often-overlooked part of an organisation’s defence measures. An effective policy informs the way employees handle cyber security threats, ensures that they use defence technologies properly and indicates board-level support for cyber security.  In this blog, we outline six essential information … [Read more...]