dcsimg

Why a cyber security culture is essential for your organisation to succeed

Do your employees complain about having to take information security training courses? Are they still practising poor data protection practices?  If so, you have a poor cyber security culture and are liable to suffer a data breach sooner rather than later.  Lax practices in the workplace mean it’s not just cyber criminals you should be concerned about but also breaches caused … [Read more...]

Cyber attacks and data breaches in review: October 2019

It was a mixed bag this month in terms of cyber attacks and data breaches. On the one hand, the 421,103,896 data records that were confirmed to have been compromised represents about half of the monthly average.  But on the other hand, the 111 incidents accounts for the highest monthly total this year.  As we do every month, let’s review some of the most notable incidents that took place in … [Read more...]

Develop better cyber security by taking a wider view of the threats

Technology giveth and technology taketh away, and not always in equal measure. A new technology sometimes creates more than it destroys. Sometimes, it destroys more than it creates. But it is never one-sided. (Postman, 1990)  Despite Postman’s dire prediction, society has profited immensely from the development, implementation, and operation of new information technologies. Our lives have been … [Read more...]

Protect your organisation by building a security-minded culture

Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be criminal hackers and a significant risk to the security of your organisation.  In Build a Security Culture, security consultant and trainer Kai Roer discusses the human and cultural factors in organisational security, and explains how to ensure your organisation is set up to manage and deter malicious … [Read more...]

7 ways your organisation can suffer a data breach

Organisations of all sizes are waking up to the threat of data breaches. But don’t be fooled into focusing on the prospect of a hacker breaking into your systems. There are many other ways that your organisation can be compromised.  Let’s take a look at seven of the biggest cyber security threats you should be concerned about.   1. Employee error Data breaches aren’t always malicious attacks. … [Read more...]

Your employees are your biggest cyber security threat

Anti-virus software, firewalls, data encryption – these are go-to security solutions for most organisations.  The problem with that? They are each designed to stop cyber criminals accessing your systems but are of little help when it comes to your biggest security weakness – human error.  Studies repeatedly show that organisations are more likely to be breached from an employee misplacing, … [Read more...]

Data Protection and the risks associated with the Cloud

This book is intended to be an introduction to the risks involved in Cloud sourcing, to enable managers to ask the right questions. Suggestions are offered for the kind of risks an organisation’s use of the Cloud might generate, and the remedial measures that might be taken. These are given as examples only and are not intended to be a substitute for qualified legal or technical advice. Other … [Read more...]

What’s the difference between a data breach and a cyber security incident?

The information security industry is full of jargon, but luckily most terms only crop up when you’re dealing with specific, technical topics. However, there’s one common but surprisingly complex phrase that often appears without further explanation: ‘cyber security incident’.  You might assume it’s simply a euphemism for organisations that don’t want to say ‘we’ve suffered a data breach’. That’s … [Read more...]

Get involved in #CyberSecMonth 2019

This week marks the beginning of ECSM (European Cyber Security Month) 2019, an initiative run by ENISA (the European Union Agency for Cybersecurity), the European Commission DG CONNECT and partners to promote the importance of cyber security and highlight the steps that can be taken to mitigate cyber security risks.   This year’s themes The theme in the first two weeks is cyber hygiene, and … [Read more...]

3 advantages of BYOD policies

Technological innovation has revolutionised business. Things like Cloud computing and the rise of remote working have made our jobs more flexible than ever, but it’s not only home workers who reap the benefits, as the rise of BYOD (bring your own device) policies has shown.  If you’re not familiar with the term, it refers to organisations allowing or requesting employees to use their personal … [Read more...]