Endpoint Security
One significant effect of the Covid-19 on global enterprise strategy was the spotlight on the key role of cybersecurity as a business enabler, putting cybersecurity leaders in direct involvement with business strategy and innovation. These changes have highlighted the importance of enterprise agility and more importantly resilience, over meticulous planning as a feature required to […]
Once Malware breaches a business, it goes about whatever activity it has been programmed to undertake to be that CnC, file encryption or just general reconnaissance and infection of other devices and networks. The longer the malware remains undetected, the more potential damage it can do. Cisco’s inception the Cisco Security report has tracked the […]
Ransomed medical devices: It’s happening The following blog is an extract from Cisco’s recent Mid Year Cyber Security Report. It highlights how cyber attackers have identified and are exploiting a niche area of healthcare technologies which carry higher levels of risk and ransomware vulnerability. Lessons can be learnt from such an attack as the methods […]
The cyber security threat landscape is constantly changing with the ever growing number and scale of attacks. The consequent measures necessary to combat the threats need to be robust, comprehensive and agile. Simply put, it is about developing an effective approach and constantly testing and refining it. The sections below cover the first 5 sections […]
Cisco’s recent mid year Cybersecurity report concludes that it is necessary to raise the security warning flag even higher. Cisco security experts are becoming increasingly concerned about the accelerating pace of change and sophistication in the global cyber threat landscape. While cyber defenders are generally improving their ability to detect threats, prevent attacks and recover […]
When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]
Today’s reliance on IT technology is unparalleled and will only increase. While some businesses are pondering the benefits of IoT deployment or bespoke business applications, others are ploughing ahead and pioneering their initiatives. Some of these initiatives are stuttering and some are big winners that have transformed their business. Digitisation and it’s attendant benefits is the new game in town […]
The Carphone Warehouse breach is the biggest so far announced in the post GDPR era. What are the salient points to note from this breach? 6 million records accessed NCSC, ICO, FCA investigating 3 million records accessed in 2015 breach Cyber security risk identified by board in last FY report If GDPR applies, maximum fine […]
We all know the cyber security threats landscape is rapidly evolving and it is a real struggle to keep apace with the threats much less get ahead of them, which ideally is where we should be. Organisations especially those small to medium sized ones have limited resources in terms of people, money and time to […]
What will you pay? With a 750% increase in ransomware attacks in 2016, a first layer of defense is needed. View the infographic for new proactive strategies with Cisco Umbrella and keep your business protected. Click here to view the infographic
- 1
- 2