Artificial Intelligence (AI) I is buzzword that everyone is using. Day-to-day items are becoming smarter and people are buying products that seemingly make their life easier. Hive helps you control your heating, Alexa makes purchases based on voice command, you can monitor food in the oven when out and adjust temperatures, your front door can be keyless, your doorbell is connected to your mobile phone, pet owners can have a live-feed to their pets all day, the list goes on!
For any new service provider or proposed systems update, there’s one important question to consider: will the changes on the table bring added value to the business? Cyber security measures are no exception to this rule.
What risks are you faced with? What are the likely costs of being hit by a breach? How do the costs of prevention stack up against the cost of clear-up? We take a look…
Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.
Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.
When it comes to cyber security, there has always been a strong ‘cat and mouse’ element: with the right help, businesses become better able to protect their data and systems from security threats - so criminals respond to this by trying to find new ways to deliver their payloads. Evidence suggests that the latest threat comes in the form of a spamming technique dubbed “hailstorm”.
In November of last year, China’s parliament rubber-stamped a controversial cyber security law. The legislation, which is due to become effective from June 1 2017, is designed to combat what the Chinese government regards as the critical threats of hacking and cyber terrorism.
In effect, those businesses who wish to make inroads into the Chinese market are faced with a choice: either comply with the new rules (thereby allowing the Chinese authorities access to proprietary information which was previously private) - or bar themselves from the market.
The rise in spear-phishing as a means to deliver potentially devastating malware to businesses has been one of the more troubling trends in cyber-security over the past year. And it’s a trend that looks likely to continue. Although, as experience tells us, these types of threats tend not to stand still, ever evolving to maintain it's capability to cause chaos.
Just as many of us are winding down for a well-earned break, this is exactly the time of year when cyber criminals are ramping up their activity.
Last year’s festive holiday season was dubbed “CyberCriminal Christmas” as online fraud attempts spiked between November and January. But it’s not just retailers that need to be wary; businesses of all types need to be wary of letting their guard down.
While the Financial Conduct Authority (FCA) have given their approval for companies to outsource their IT and data storage to third party cloud providers, the consent comes with a number of guidelines, issued to ensure that such providers remain compliant.