dcsimg

What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?

Trying to understand what network security solutions are available, the differences between them, how and when they should be used, can be overwhelming for most organizations. While there are many options to choose from, a typical suite of tools would include an Intrusion Prevention System (IPS), Data Loss Prevention (DLP) software/hardware, and a sophisticated Data-Centric Audit & Protection … [Read more...]

Why Aren’t Consumers Angrier About Data Breaches?

Over the last few years we have been unfortunate enough to be witness to numerous data breaches of unimaginable size and scale. So why have these organizations been able to recover so quickly and why aren’t consumers angrier about how their data is being handled? Target, Facebook, Equifax, British Airways and Cambridge Analytica (to name a few) are all examples of companies failing to adequately … [Read more...]

Tips for Mitigating Data Breaches When Using Cloud Services

According to a recent report by McAfee, the average employee actively uses 36 cloud services at work, and a lot of the data that get stored using these services is sensitive (18.1%). Such data includes financial records, business plans, Social Security numbers, credit and debit card numbers, protected health information, and so on. The above figures highlight the importance of a tight … [Read more...]

The Marriott Data Breach: All You Need to Know

By now, I’m sure most of you will have heard about The Starwood Hotels and Resorts data breach that resulted in the exposure of an astonishing 500 million hotel guests’ data. Everyone is waiting with bated breath to see whether this breach will lead to the world’s first significant GDPR fines. What Happened? In a statement filed with US regulators on the 30th November 2018, the hotels and resort … [Read more...]

How Will A Cyber-Attack Impact Your Business?

According to the 2018 Horizon Scan Report, cyber-attacks present the greatest threat to organizations, and the average total cost of data breach has climbed to $3.86M, according to the 2018 Cost of a Data Breach Study. Of the financial costs mentioned in the above report, “lost business” was the leading contributor – accounting for as much as $1.45 million. Loss of business was … [Read more...]

How Can We Prevent Employees Violating Security Policies?

Employees violate security policies on a regular basis, hence why the majority of data breaches are caused by insiders, in some way or another. Sure, sometimes security incidents are caused by disgruntled or opportunistic employees; however, most of the time the motives are less suspicious. So, what are the main reasons employees violate security policies? 1. A Lack of Security Awareness Training … [Read more...]

How to Keep ePHI Out of the Wrong Hands, Whilst Ensuring Availability

Naturally, healthcare service providers were keen to switch from paper-based health records to electronic health records (EHRs), as doing so makes it a lot faster and easier to access patient data and improve patient care. However, healthcare service providers, including any third-parties they are affiliated with, need to find a way to balance the risks and rewards. According to a recent article … [Read more...]

How Does Privilege Separation Improve IT Security?

Privilege separation is a technique used to segregate parts of an IT environment based on its users and their roles. For example, imagine if a user downloaded a malicious program, such as a ransomware application. If that particular user was logged in as an administrator, the ransomware application would effectively have the same privileges as that user. Obviously, this could have disastrous … [Read more...]

What is the right penetration test for you?

It seems like we hear about another data breach on a daily basis. Recognised companies such as Facebook, Ticketmaster and Dixons Carphone – to name but a few – have recently suffered at the hands of criminal hackers, who are gaining access to organisations’ networks using a variety of techniques.   Penetration testing is a systematic process of probing for vulnerabilities in your applications and … [Read more...]

Is it Possible to Prevent Data Breaches Caused by Insiders?

It’s no secret that businesses all over the world are struggling to tackle the security concerns posed by insiders. The insider threat is consistently found to be one of the biggest causes of data breaches for organizations of all shapes and sizes. If your security strategy focusses on building walls to stop external threats from getting in, then your security strategy is back to front. If you’re … [Read more...]