Eskenzi PR banner ad Eskenzi PR banner ad

Insight

Now is the time for security leaders to build business resilience

COVID-19 has accelerated years of digital transformation into just a few months, weeks, and even days. Accenture recently moved 1.2 million NHS workers to Microsoft Teams in less than a week. And we are not alone – Satya Nadella recently said that Microsoft had seen two years’ worth of digital transformation in 2 months. This monumental shift to remote working, changing business priorities and the reconfiguration of supply chains has created new attack vectors and...

Read more
Businesses are confident that they have bots under control. They’re wrong.

Businesses can make better decisions if they have a good idea of who is using their website. Are they young or old? Male or female? It turns out they are very likely not even people. The majority of web traffic is made up of automated bots, and a great deal of these are malicious. The popular narrative around bots is that they are spreading misinformation on social media, but most aren’t involved in nation state-level...

Read more
Staying ahead in the regulatory race

Governments are playing catch-up across the world. Data privacy breaches from large tech companies, such as Nintendo and Marriott, are becoming more commonplace—and as a result are putting pressure on authorities to introduce stricter compliance policies to safeguard the public. As such, IT pros who live in countries that have implemented policies, such as GDPR, PCI DSS, HIPAA, and DPA, are now impacted on a day-to-day basis. Today more than ever, IT pros are being...

Read more
How to prevent a flood of security hacks by avoiding code leaks

This week sees us celebrate National Coding Week, an event designed to promote the vital role of coding and other digital skills in today’s connected world. Coding, and the languages it uses, provides the bedrock on which we’ve built our digital world – a world which has become even more integral to everyday life given this year’s events. Thanks to greater connectivity we’re all becoming digital natives. But this increasing connectivity also increases our vulnerability...

Read more
Physical/cybersecurity defence: Waking up to the reality of hybrid attack

For us to begin, do me a favour and google search “hybrid attacks”. Cybrary defines a Hybrid attack as “a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.” Do you agree? What does hybrid really mean when it comes to security? Physical, cyber,...

Read more
Nigel Thorpe

For millions, work used to be somewhere you go. Now it's something you do. From an IT point of view, being unable to control the security of the remote working environment is a significant concern. The employee now sits at home on their laptop, connecting to business servers and applications through virtual private networks, remote desktop or using the cloud. This is all within the control of the IT security team. However, what processes are...

Read more
Author headshot

Companies are under siege. With attackers growing ever more creative, many security vendors are assembling a laundry list of cybersecurity solutions in response. Businesses have at their fingertips a variety of vendors to choose from – each offering top-of-class solutions that should leave attackers ruing the day. But how do IT teams navigate the complex landscape of multiple vendors and tools? Even before the COVID-19 pandemic the enterprise cybersecurity landscape was dominated by chaos and...

Read more
Brian Foster Insight

Phishing and ransomware are inextricably linked. Phishing is the number one delivery mechanism for getting malicious exploits, including ransomware, into mobile devices. According to MobileIron’s latest research, 60% of IT decision makers agree that phishing is the most significant threat faced by their organisation. Advanced persistent threat actors are now chaining sophisticated exploits to not only grab user credentials, but also redirect victims to phishing websites where they could unknowingly download malware onto their mobile...

Read more
Author headshot Rick Goud

With data protection regulations evolving worldwide and the Brexit transition period ending in less than five months – impacting both the GDPR and DPA – now is the time for organisations to future-proof their communication security. Doing so will not only ensure continuous data privacy compliance, it will also help to avoid financial penalties through non-compliance, dissatisfied customers (leading to possible customer churn) and damaged reputation. A critical early step is to reduce, if not...

Read more
Tony Pepper Header Insight

Data loss prevention (DLP) solutions have failed – but it’s an important truth that we need to accept.   Legacy DLP solutions have failed to stop data breaches from happening.  Why? Because they simply can’t cater to the changes that have happened over the last decade to the way sensitive data is created, stored and (most importantly) shared. These changes have introduced new risks that it’s impossible to properly mitigate using older, static DLP solutions. That’s because...

Read more
Page 2 of 4 1 2 3 4