dcsimg

Why your organisation should consider outsourcing its DPO

Since the EU’s GDPR (General Data Protection Regulation) came into effect in May 2018, demand for DPOs (data protection officers) has increased. The Regulation stipulates that certain organisations must appoint a DPO to support their GDPR compliance. DPOs also have an essential role as intermediaries between relevant stakeholders, such as supervisory authorities, data subjects, and business units … [Read more...]

Penetration testing and the EU GDPR

Data breaches are on the rise and affecting Irish organisations, most recently Eir and Cork City Council’s Park by Phone service.  Criminal hackers are gaining access to organisations’ networks using a variety of techniques, so ensuring your network is secure should be high on your agenda. Penetration testing is an effective method of determining the security of your networks and web applications, … [Read more...]

Free webinar: First steps to GDPR compliance

The GDPR (General Data Protection Regulation) has significantly reshaped the data protection landscape for organisations worldwide that collect and process EU residents’ personal data. The Regulation imposes fines of up to 4% of annual global turnover or €20 million (whichever is greater) for non-compliance.  Data breaches are on the rise and affecting Irish organisations such as Eir, which … [Read more...]

Cork City Council, Park by Phone service breached

More than 5,000 people have been affected by a data breach of Cork City Council’s Park by Phone service. Although the reported breach occurred last Thursday and the relevant authorities were notified on Friday, it has come to light that the breach first occurred in May. Personal details such as car registration numbers, email addresses and mobile phone numbers have been compromised, but no … [Read more...]

Last month’s top cybersecurity stories – August 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cyber security stories of August 2018. Fortnite app comes to Android, bringing multiple security worries Wildly popular shoot-em-up game, Fortnite, finally came to Android this month, […] … [Read more...]

CEOs the worst offenders when it comes to email security

Nearly 60% of organisations will fall victim to an email-based attack this year, and there’s a good chance the guilty party will be the CEO, according to Mimecast’s The State of Email Security 2018. According to the report, 37% of respondents said their organisation’s CEO is a “weak link” in their cyber security programme. Evidence backs this up: Mimecast found that 31% of C-level employees had … [Read more...]

The top cyber security trends of 2018 so far

There have been more than 600 data breaches this year, so people who want to pick out the most serious incidents have plenty to choose from. It’s not simply a case of finding the breaches involving the highest number of stolen records, because a breach compromising names and email addresses isn’t the same as a breach compromising payment card information. Besides, infrastructural damage and … [Read more...]

A week in security (July 9 – July 15)

Last week, we talked about domestic abuse fuelled by IoT, doing threat intel programs right, blocking ICO fraud, and man-in-the-middle attacks. We also explained why we block shady ad blockers and provided tips to online shoppers for Prime Day. Other news: Reports revealed that low-end Android devices sold in Egypt, Brazil, South Africa, Myanmar, and other developing markets contain pre-installed … [Read more...]

What makes ISO 27001 the go-to standard for information security?

ISO 27001 is one of the fastest-growing management standards in the world. with the number of awarded certifications increasing by 20% in consecutive years. In 2016 (the last available figures), 33,290 certifications were issued worldwide, and 27,536 certifications were awarded the year before.  ISO 27001 is clearly very popular, but what makes it the standard for information … [Read more...]

52% of web applications contain high-severity vulnerabilities

A new study has highlighted the poor state of web application security. Positive Technologies tested various web applications, and found that every single one contained vulnerabilities, with 52% containing high-severity weaknesses.  The Web Application Vulnerabilities report also found that:  48% of tested applications are vulnerable to unauthorised access;  44% of applications placed personal … [Read more...]