dcsimg

What to do when you’ve been infected with ransomware

Chances are, your organisation is going to have to contend with a ransomware attack in the near future. There were more than 850 million infections reported in 2018, and there are no signs of things slowing down.  Attacks can be a stressful time for organisations, with infections designed to scare recipients and grind your organisation’s productivity to a halt. Fortunately, we’re here to explain … [Read more...]

Credit unions should be prepared for crimeware

We recently discussed why credit unions must conduct regular penetration tests. The bulk of that article covered the legal obligations for testing and the ways in which you can comply with those requirements.  However, we didn’t delve into the reason that penetration testing is essential – which we’ll put right here.    How penetration testing helps organisations  Penetration testing is … [Read more...]

List of data breaches and cyber attacks by region: June 2019

It’s been a bad month for Australia and Canada: dumped out of the Women’s World Cup and responsible for 13 data breaches. Meanwhile, another Irish hospital has left medical records on a city street for the public to find and local US governments continue to be plagued by ransomware. In total, there were at least 62 data breaches and cyber attacks in June 2019. You can read the full list below, and … [Read more...]

What is business continuity and why is it so important?

The ever-present threat of cyber crime and organisations’ increasing reliance on technology means that business disruptions are inevitable these days. Any day now, your systems could be breached or your physical premises disrupted by criminals, inattentive employees or damaged infrastructure.  When that day comes, you can’t afford to be caught … [Read more...]

Microsoft suffers data breach affecting webmail accounts

Microsoft has confirmed that a number of its email services have been breached, with users’ email content potentially exposed.  The tech giant noted in its incident statement on 12 April that the criminal hackers could have viewed email addresses, folder names and email subject lines, but … [Read more...]

The most common causes of data breaches and how you can spot them

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident?  According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered within this timeframe was $5.99 million (about €5.3 million), but if it takes longer, the average rises to … [Read more...]

The 6 most common ways data breaches occur

The first step towards cyber security is identifying how data breaches occur and the level of risk each one poses.  To help organisations do this, Verizon conducted a year-long investigation into the leading causes of data breaches, publishing its findings in its 2018 Data Breach Investigations Report.  In this blog, we break down … [Read more...]

What is the right penetration test for you?

It seems like we hear about another data breach on a daily basis. Recognised companies such as Facebook, Ticketmaster and Dixons Carphone – to name but a few – have recently suffered at the hands of criminal hackers, who are gaining access to organisations’ networks using a variety of techniques.   Penetration testing is a systematic process of probing for vulnerabilities in your applications and … [Read more...]

Pros and cons of penetration testing

Cyber attacks are costly to any organisation. They can cripple systems, lead to large fines and cause reputational damage. Performing an internal penetration test can help safeguard your organisation and its network.   Penetration testing is globally acknowledged as an important part of cyber security, but, like any security mechanism, it’s not perfect.   Below is an outline of the pros and cons … [Read more...]

The top cyber security trends of 2018 so far

There have been more than 600 data breaches this year, so people who want to pick out the most serious incidents have plenty to choose from. It’s not simply a case of finding the breaches involving the highest number of stolen records, because a breach compromising names and email addresses isn’t the same as a breach compromising payment card information. Besides, infrastructural damage and … [Read more...]