Foration Blog

How to get Cybersecurity buy-in from the C-Suite

Cyber-threats are one of the great risks to businesses of all sizes, across all locations. And this risk is going to increase ever more so as we head into the heart of 2017. Indeed, along with the uncertainty over Brexit, cyber-crime is seen as one of THE biggest threats facing UK business this year.

And yet, despite both recognition that the risk is real, the recent high profile attacks at Tesco Bank, Yahoo and others suggest that too many business leaders are not giving the threat the serious levels of consideration that it warrants. As perhaps highlighted by the fact that almost three-quarters of SME leaders admitted that they had no adequate cover in place to protect against a breach of their system.

How to build trust with your clients in the new age of data regulation?

Businesses and professional services providers are busy getting to grips with the implications of the General Data Protection Regulation (GDPR) - and the new framework it provides.

It’s easy to view compliance as a purely internal matter; essentially a process of joining the dots to keep on the right side of the regulator. But this mindset misses the whole purpose of the new data regime: to increase consumer confidence in the digital marketplace - i.e. to enable your clients to share their data with you, safe in the knowledge that it will be safe.

What are "Zero day leaks" and how can you protect against them?

As awareness about the many dangers and potentially devastating effects posed by cyber-attack increases, so many of the different names, phrases and terminologies gain greater prominence in the public lexicon. With malware, denial of service, ransomware and hacking all breaking out from the tech pages into mainstream consciousness thanks to some extremely high-profile incidences in recent years.

Data protection: Do I need a dedicated officer?

The General Data Protection Regulation (GDPR) is due to come into force in little over a year’s time (25 May 2018). Among the many changes ushered in, GDPR introduces a new governance requirement: the duty on the part of certain organisations to appoint a data protection officer (DPO).

Will your organisation fall under this new requirement? Read on to find out…

Checklist: Is your company prepared for GDPR?

The General Data Protection Regulation (GDPR) comes into force in a little over a year from now, May 25th 2018, with new compliance regulations concerning the protection of personal data.

Essentially an update on regulations already in place under the data protection act, the GDPR is being transposed into law across all member states of the European Union (EU). And, despite the triggering of Article 50, and the withdrawal of the UK from the EU, this is still a directive that UK companies will need to adhere to; as Britain will remain under full EU law until the separation is complete (so, at least another 2 years).

What is GDPR and how will it affect your business?

The General Data Protection Regulation (GDPR) comes into law from 25 May 2018. Its aims are broad: to make the digital marketplace a more secure place for consumers - with new safeguards to ensure the safety and integrity of personal data.

It also means new responsibilities for businesses. Short-term, the priority should be on ensuring your data processing and security framework is aligned to the requirements set out in the legislation. Longer-term, remember that GDPR readiness isn’t a one off tickbox exercise: from regular stress testing through to careful choice of products and service partners, compliance should be a top priority.

How can you guide staff in using uber-secure passwords on your systems?

Passwords are often referred to as the first line of defence in protecting a wide range of business systems from security breaches.  Companies need to have a strong, easily understood password policy in place, so employees understand their personal responsibilities.

In isolation, password barriers are insufficient as a means of keeping your network secure. It may be worth reviewing your infrastructure to consider whether password protection should be bolstered - or replaced - with more suitable measures.

Why Trump's "Offline" approach to IT security is massively flawed

“No computer is safe.” Or, at least, not in the eyes of US President, Donald Trump. At his first New Year’s Eve reception in his new role, the Commander-in-Chief suggested that the only truly effective means of protection against hackers and prying eyes is to maintain a massive air gap.

So is there some truth in what the President is saying? Is it a case of offline equals ‘good’ and online equals ‘bad’ when it comes to data security?

Prepare or repare? The risks and costs of cyber-attack compared

For any new service provider or proposed systems update, there’s one important question to consider: will the changes on the table bring added value to the business? Cyber security measures are no exception to this rule.

What risks are you faced with? What are the likely costs of being hit by a breach? How do the costs of prevention stack up against the cost of clear-up? We take a look…

A hacker's 3-step IT checklist for getting and STAYING protected

Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.

Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.

Subscribe to our Blog