The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business...
Read MoreIt has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise that the adoption of IT security solutions in corporate businesses is on the rise, with 1.9 billion personal and sensitive data records compromised between January 2017 and March 2018. By Adrian...
Read MoreBy Ian Kilpatrick, EVP Cyber Security, Nuvias Group.
Read MoreThe main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By Simon Church, General Manager and Executive Vice President, Europe at Optiv.
Read MoreIt has become increasingly accepted by many organisations that a security breach, in some form or another, is unavoidable. Even the most robust and cutting-edge security defences can potentially be thwarted by a dedicated adversary armed with new attack techniques. From the downtime to the cost of the clear-up, the impact can be devastating: in fact, a 2017 study by Ponemon estimated that the average data breach carried a total cost of $3.62m. By Joseph Carson, Chief Security Scientist at...
Read MoreThe ongoing impact of GDPR, by Dan Harding, Director, Sign In App.
Read More