Data Protection
The basic objective of a cloud security strategy is to provide a method to monitor and protect the flow of information to and from cloud hosted services. There has been and will continue to be a shift towards public and private cloud services as the age of digitisation is increasingly being embraced by organisations. According […]
When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]
The Carphone Warehouse breach is the biggest so far announced in the post GDPR era. What are the salient points to note from this breach? 6 million records accessed NCSC, ICO, FCA investigating 3 million records accessed in 2015 breach Cyber security risk identified by board in last FY report If GDPR applies, maximum fine […]
We all know the cyber security threats landscape is rapidly evolving and it is a real struggle to keep apace with the threats much less get ahead of them, which ideally is where we should be. Organisations especially those small to medium sized ones have limited resources in terms of people, money and time to […]
I attended Infosec2018 this week at London Olympia. It was a vibrant event as you can imagine with every exhibitor enthusiastic to promote their wares. They were also eager to grab your details with their ‘GDPR compliant’ badge scanner. As a technologist of too many years to mention (I started in IT when 5-inch floppy […]
Have you sometimes found yourself bewildered by the sheer volume of bad news out there especially about emerging cyber threats and actual attacks. It is not uncommon to wonder when you will come under a similar threat or worst still is it happening already but you just haven’t detected it yet. What would give us […]
Having GDPR compliant processes and procedures is an essential and fundamental part of ensuring a robust data security and management regime is implemented in your organisation. Another crucial and as important component of compliance is having the right tools in place that will support the necessary management, security and monitoring of data assets. This means […]
The GDPR regulation is ultimately about good data/information management and governance. Though many organisations acknowledged previous iterations of data protection regulation, GDPR demands that everyone step up their game and take responsibility or face severe consequences. The innovative use of technology aligned with the data handling processes and procedures will go a long way to […]
What will you pay? With a 750% increase in ransomware attacks in 2016, a first layer of defense is needed. View the infographic for new proactive strategies with Cisco Umbrella and keep your business protected. Click here to view the infographic
We introduce another acronym yesterday, CASB (Cloud Access Security Broker) and we now expand on the features and benefits of deploying a CASB solution as we continue in our approach to cloud security. We noted in our previous blog that cloud security was a shared responsibility between service user and service provider. Gartner analysis indicates […]
- 1
- 2