Businesses unable to count the cost of security breaches

UK businesses are finding it difficult to count the cost of security breaches, a new study has revealed. Research commissioned by CipherCloud found that almost seven in ten (68 per cent) business decision makers are unable to estimate the cost of data loss. “Our research reveals some interesting insights into the minds of senior business…

0

Teaching Employees New Security Tricks

To help fend of spam, viruses, identity theft and corporate sabotage, IT managers need to train company employees to protect themselves and the corporate network, but with mass budget cuts and understaffed IT departments, it is just not getting done. That’s leaving IT managers with even more headaches and even more problems. The simple problem…

1

Security is getting better

Windows 8 is just fab isn’t? So many nice words and so useful. This blog may still be biased, but we just love it. Highlighted this week are just some of the security highlights available on the operating system. Windows 8 includes a number of new and improved security features. Not only is there the…

0

Hot Topics: Free ebook, Windows 8 Security and the growth of cybercrime

Free ebook: Introducing Windows 8: An Overview for IT Who likes free stuff? Of course you do. Who wouldn’t? Thankfully for great IT professionals like yourself, Microsoft Press has released a FREE ebook. Yay! It is a FREE ebook Introducing Windows 8, primarily as an overview for IT Professionals.  This ebook is written exclusively for…

0

Human the weak link

Humans: The weakest link in cyber security? You betcha? It appears that we’re treading on old ground – we are! But more and more and more emphasis needs to be put on security and, ultimately, humans. Rik Ferguson, Director Security Research and Communication The mass introduction of technologies in every environment must take care of…

1

Hot Topics in Security: BYOD, Human weak link & BYOD again

#ENISA #BYOD risk report published today (-1) Workplace IT? You got to love it! Last week ENISA published a detailed report covering the risks associated with the Bring Your Own Device (BYOD) trend to see opportunities and risks about applying the practice. Using own computers, phones, social networks and smart devices is the way to…

0

Cybercrime Warning

This is the first steps in realising the full extent of cybercrime: William Hague told delegates that cybercrime was “one of the greatest global and strategic challenges of our time”. Not bad going. Mr Hague kindly highlighted the UK’s resolve to tackle the problem (eventually) – it is even spending £2m setting up a cybercrime…

0

Hot Topics in Security: Hague Warns us about Cybercrime, Free Security Tools for All and Mobile Devices Under Attack…Again

What a Hague! (0) Drop everything. Literally everything. A foreign secretary is sticking his oar in and warning us about cybercrime. Is it a foreign crime? Things just got serious. He told delegates that cybercrime was “one of the greatest global and strategic challenges of our time”. This just after playful MPs accessed his Facebook account…

0

Security must get a grip of new technology

Chalk and cheese. Black and white. Security and new technology. The last one is not exactly the opposite of each other, but the feeling it has in the IT industry appears that way. Following our Hot Topics debate, there much talk about ‘child-proofing’ devices and laptops stop data breaches from within. However, some question the…

0