Capital One breach raises doubts over cloud security
Credit card company Capital One revealed on Monday the 29th of July that information on over 106 million of its customers had been exposed in one of the largest banking breaches ever. [1] The breach took place on the 19th of July and exposed the data of mainly US and Canadian customers applying for credit […]
Read MoreThe IT security trends you can’t afford to ignore
Information technology is a rapidly changing field and IT security even more so. Since the introduction of GDPR in 2018, we’ve seen a shift in emphasis towards personal data and ensuring it’s held in accordance with compliance rules. This, in turn, has put more pressure on firms to guard personally identifiable information (PII) effectively, in […]
Read MoreCombating insider business threats without harming trust
According to research from the Ponemon Institute [1] insider threats are now one of the biggest risks that businesses face globally, accounting for around 64 per cent of all security breaches. In order to combat these threats, many businesses are turning to employee monitoring, but how can this be managed without creating distrust among staff? […]
Read MoreThere’s a cyber skills shortage – it’s official
There has been talk within the IT industry of a shortage of cyber security skills for several years. However, last week the Government made the shortage official by adding cyber security engineers and analysts to its Shortage Occupation List. [1] The SOL, drawn up by the Government’s Migration Advisory Committee, is the recognised measure of […]
Read MoreIs it the end of the road for the password?
People have been predicting the demise of the password for a long time. No less a person than Bill Gates did so in 2004. [1] Yet, 15 years on from Bill’s comments, we are still heavily reliant on passwords for many of our business and online activities. Indeed we probably have more than ever. In […]
Read MoreWhy text may not be the best choice for two-factor authentication
Many cyberattacks are carried out using stolen or weak credentials. Which is why the security industry is encouraging us to take more care of our logins by adding two-factor authentication (2FA). This means that after entering your password, you have to enter a verification code that’s sent to you via another device. There are a […]
Read MoreThe effect of remote working on systems security
In the past, most office workers were in the same location most of the time. In the modern business world, however, thanks to flexible working patterns, the need for some staff to be mobile means that it’s increasingly common for staff to switch between locations, work from home, or use mobile devices on the move. […]
Read MoreThe number of cyber security breaches is down – but is it too soon to celebrate?
New figures from the Department for Digital, Culture, Media and Sport reveal that the number of businesses reporting breaches and cyber attacks has fallen. This is in line with a similar trend seen by the general public in the Crime Survey for England and Wales. [2] The number of businesses experiencing an attack in the […]
Read MoreFacebook’s 2FA may be making you less private
As high profile data breaches and leaks continue to hit the headlines, more people are becoming aware of the benefits of two-factor authentication (2FA). This allows you to overcome the weaknesses of relying on just a password by having an authentication code sent to a mobile phone – either as a text or via an […]
Read MoreAre Chinese tech firms a threat to western security?
The future promised us by technology companies is one of smart cities wherein autonomous vehicles will negotiate with each other to find congestion-free routes; where public services such as health and energy provision will be managed efficiently through data; and where even our homes will be run by smart devices. Whether you think this represents […]
Read More