dcsimg

Microsoft suffers data breach affecting webmail accounts

Microsoft has confirmed that a number of its email services have been breached, with users’ email content potentially exposed.  The tech giant noted in its incident statement on 12 April that the criminal hackers could have viewed email addresses, folder names and email subject lines, but … [Read more...]

The most common causes of data breaches and how you can spot them

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident?  According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered within this timeframe was $5.99 million (about €5.3 million), but if it takes longer, the average rises to … [Read more...]

The 6 most common ways data breaches occur

The first step towards cyber security is identifying how data breaches occur and the level of risk each one poses.  To help organisations do this, Verizon conducted a year-long investigation into the leading causes of data breaches, publishing its findings in its 2018 Data Breach Investigations Report.  In this blog, we break down … [Read more...]

What is the right penetration test for you?

It seems like we hear about another data breach on a daily basis. Recognised companies such as Facebook, Ticketmaster and Dixons Carphone – to name but a few – have recently suffered at the hands of criminal hackers, who are gaining access to organisations’ networks using a variety of techniques.   Penetration testing is a systematic process of probing for vulnerabilities in your applications and … [Read more...]

Pros and cons of penetration testing

Cyber attacks are costly to any organisation. They can cripple systems, lead to large fines and cause reputational damage. Performing an internal penetration test can help safeguard your organisation and its network.   Penetration testing is globally acknowledged as an important part of cyber security, but, like any security mechanism, it’s not perfect.   Below is an outline of the pros and cons … [Read more...]

The top cyber security trends of 2018 so far

There have been more than 600 data breaches this year, so people who want to pick out the most serious incidents have plenty to choose from. It’s not simply a case of finding the breaches involving the highest number of stolen records, because a breach compromising names and email addresses isn’t the same as a breach compromising payment card information. Besides, infrastructural damage and … [Read more...]

Online anonymity has allowed cyber crime to thrive

Online anonymity is a complicated topic. There’s no doubt that the elasticity it gives our identities is a massive benefit. We can explore different sides of our personality without affecting the reputation of any other part of us. Unfortunately, that’s also proven to bring out the worst in some of us, with people committing acts online that they would never do in person. Cyber bullying and mob … [Read more...]

What makes ISO 27001 the go-to standard for information security?

ISO 27001 is one of the fastest-growing management standards in the world. with the number of awarded certifications increasing by 20% in consecutive years. In 2016 (the last available figures), 33,290 certifications were issued worldwide, and 27,536 certifications were awarded the year before.  ISO 27001 is clearly very popular, but what makes it the standard for information … [Read more...]

1 in 8 cyber attacks successful in Denmark

A recent survey by the Danish Society of Engineers’ IT subsidiary, IDA-it, concluded that two thirds of businesses had experienced a cyber attack, and that up to one in eight cyber attacks carried out against Danish organisations are successful. IDA-it surveyed people working in IT or personal data related roles in the public and private sector. Kåre Løvgren, IDA-it’s chairperson, said that … [Read more...]

Danish rail network DSB hit by cyber attack

DSB, the Danish state rail operator, was hit by a distributed denial-of-service (DDoS) cyber attack on Sunday, April 13. A DDoS attack attempts to disrupt a host or network from connecting to the Internet in order to render a network or machines unavailable. It meant that passengers were unable to buy tickets on Sunday, and purchases through DSB’s ticket machines, app, website and retail stores … [Read more...]