dcsimg

3 advantages of BYOD policies

Technological innovation has revolutionised business. Things like Cloud computing and the rise of remote working have made our jobs more flexible than ever, but it’s not only home workers who reap the benefits, as the rise of BYOD (bring your own device) policies has shown.  If you’re not familiar with the term, it refers to organisations allowing or requesting employees to use their personal … [Read more...]

5 steps to an effective ISO 27001 risk assessment

Risk assessments are one of the most important parts of an organisation’s ISO 27001 implementation project.  The process can be tricky, but this blog simplifies the process by breaking it down into five easy-to-follow steps.   1.Establish a risk management framework One of the key elements is having conditions for performing a risk assessment – e.g. annually and whenever there is a … [Read more...]

Why you should be concerned about employees using social media at work

There’s a time and a place for browsing social media, and for some of us that’s ‘all the time’ and ‘anywhere’. It doesn’t matter if you’re posting a quick Tweet, jumping to attention when you receive an IM or idly refreshing Facebook for updates; nothing can keep us in the real world for long.  And although employers have long since lost the battle to prevent staff glancing at their Facebook … [Read more...]

IT Governance Europe exhibiting at TechConnect Live 2019

IT Governance Europe will be exhibiting at this year’s TechConnect Live in Dublin on 30 May 2019.   Attendees are invited to visit us at stand F18, where we will be presenting a wide range of GDPR (General Data Protection Regulation), IT GRC (governance, risk and compliance), and cyber and technical products and services. Our team will be on hand to … [Read more...]

Online anonymity has allowed cyber crime to thrive

Online anonymity is a complicated topic. There’s no doubt that the elasticity it gives our identities is a massive benefit. We can explore different sides of our personality without affecting the reputation of any other part of us. Unfortunately, that’s also proven to bring out the worst in some of us, with people committing acts online that they would never do in person. Cyber bullying and mob … [Read more...]

Why you need to report cyber attacks

Once you’ve been hit by a cyber attack, the damage has already been done. There’s no way to make the disruption disappear, so you might suppose it’s best to just get on with things. Reporting the incident to your supervisory authority means extra work and could cause a PR nightmare. Nonetheless, it’s essential that you notify relevant parties of the breach. The attacker is a criminal, and it’s … [Read more...]

Police arrest criminal hacker who stole €1 billion from banks

Spanish police have arrested a Ukrainian criminal hacker who is suspected of heading a gang that stole more than €1 billion from banks around the world. The suspect, who hasn’t been named, used Anunak, Carbanak and Cobalt malware to hack into banks’ computers and manipulate money transfers. Twenty members of the suspect’s gang were also apprehended in a series of arrests across Romania and … [Read more...]