dcsimg

Google removes 60 apps infected with malware

  Malware called AdultSwine, which displays ads with pornographic content, has been discovered in 60 games on the Google Play Store. Many of these games were designed for children. Security company Check Point discovered the malware and reported it to Google, which removed the affected games from its store.  The ads came from trusted providers that do not allow this type of content. The … [Read more...]

Business continuity: Why organisations should plan for the worst

Targeted attacks by skilled and persistent cyber criminals are now a business reality, so organisations need to have an effective business continuity plan in place to ensure their survival. Growing concern about cyber attacks In September 2017 the European Commission reported that 80% of European organisations suffered at least one cyber security incident and the economic impact of cyber crime has … [Read more...]

How can you validate a vendor that claims to be ISO 27001 certified?

As the number of cyber attacks continues to grow, many companies are adding ISO 27001 certification as a requirement on their supplier set-up forms. This is a good idea, especially as the forthcoming General Data Protection Regulation (GDPR) focuses on vendor management. If a vendor has an ISO 27001-compliant information security management system (ISMS) in place, this provides concrete evidence … [Read more...]

How ISO 27001 can help with your GDPR project

Coming into effect on 25 May 2018, the EU General Data Protection Regulation (GDPR) will supersede all EU member states’ current national data protection laws, bringing a standardised approach to data protection throughout the EU. The Regulation also brings with it a new suite of enforcement powers for supervisory authorities throughout Europe to penalise companies that are found to be … [Read more...]

The #1 priority for improving cybersecurity? Implementing a Privileged Account Management Cycle approach!

In a white paper released in October 2017 by analyst firm KuppingCole, Martin Kuppinger makes the case for why companies need to pay more attention to privileged account protection at all levels. Entitled, “Protecting the keys to your kingdom against cyber-attacks and insider threats,” he points out that Privileged Account Management is far more than just managing a few administrators and some … [Read more...]

4 best practices for avoiding cyber attacks

Most organisations will suffer a data breach in the next year, whether it’s caused by a malicious actor or a careless employee. There are no defences you can put in place to eradicate breaches, but there are steps you can take to mitigate the risk of an attack and the damage that they can cause. Software company ObserveIT sets out the best practices for organisations, and we’ve highlighted the … [Read more...]

4 cyber security predictions for 2018

At the end of every year, people are bombarded with articles predicting trends and events for the following year. Some of the predictions for the cyber security industry in 2018 are obvious – “cyber crime will rise” – and others provocative – “the EU General Data Protection Regulation (GDPR) will bankrupt everybody” – but one thing’s for sure: most of them will be wrong. We’ve trawled through … [Read more...]

Cyber Security: What we’ve learned in 2017 to get ready for 2018

Well, it’s been a very interesting year with a few surprises along the way, but as expected, cyber crime grew, financial impact was huge and many companies struggled to recover. Cyber attacks will be the biggest threat to every person and business on earth Cyber security is quickly becoming part of everyone’s daily life and can no longer be separated into personal and work life. In the past cyber … [Read more...]

Stop storing cleartext credentials in the registry for Point of Sale systems

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about how auto logon works, why it’s not recommended in most cases, and … [Read more...]

A fresh coat of paint over rust does not reduce complexity or improve customer experience

I have been in the industry for a long time with more than 25 years’ experience in building proven security products, and sharing my cybersecurity knowledge, to help companies reduce the risk against cyber threats. One thing I have found in this vast evolving cybersecurity industry is that complexity and security do not mix, if a product is far too complex, takes too long to implement and with … [Read more...]