Investing in technology is high on the agenda in every boardroom, due to the increased need to improve security, address the regulatory pressures of GDPR, and create flexibility for an ever-changing workforce.
With high-profile cases of hacking making headlines around the world, more and more businesses are taking cyber security seriously and are stepping up their efforts to protect their assets and data.
To help Office 365 users in particular ensure the security of their organisations, Microsoft released Secure Score to the public in early 2017 - an analytics platform that assesses a company’s current security measures and suggests any possible improvements that could be made.
Passwords are often referred to as the first line of defence in protecting a wide range of business systems from security breaches. Companies need to have a strong, easily understood password policy in place, so employees understand their personal responsibilities.
In isolation, password barriers are insufficient as a means of keeping your network secure. It may be worth reviewing your infrastructure to consider whether password protection should be bolstered - or replaced - with more suitable measures.
“No computer is safe.” Or, at least, not in the eyes of US President, Donald Trump. At his first New Year’s Eve reception in his new role, the Commander-in-Chief suggested that the only truly effective means of protection against hackers and prying eyes is to maintain a massive air gap.
So is there some truth in what the President is saying? Is it a case of offline equals ‘good’ and online equals ‘bad’ when it comes to data security?
Protecting your IT system from breaches and hacking is one of the great challenges faced by organisations operating in the modern world. As we’ve discussed before, if you’re unsuitably guarded against an attack then you are putting your company into the very real danger of catastrophic damage; to your finances, your brand name, and, perhaps, to the very existence of the company itself.
Of course, the risks are varied, often complex, and ever evolving. The challenge for IT security experts is to monitor the digital landscape for new threats and emerging trends, to develop proactive strategies that protects your system from immediate threats and for the long-term.
When it comes to cyber security, there has always been a strong ‘cat and mouse’ element: with the right help, businesses become better able to protect their data and systems from security threats - so criminals respond to this by trying to find new ways to deliver their payloads. Evidence suggests that the latest threat comes in the form of a spamming technique dubbed “hailstorm”.
The risk of hacking, malware or other cyber-attack is a pervasive and potentially devastating part of modern working life. A threat from which everyone is at risk; every organisation, every industry sector. Including those working within the realm of IT and internet security. Which is why they practice what they preach; taking every precaution possible to prevent the damage that can arise from an attack.
Federation of Small Businesses (FSB) data suggests that two thirds of small firms have been a victim of cyber crime in the last two years. The message is clear: UK business owners need to resist the temptation of assuming that an IT security breach is something that happens to ‘other people’.
Yet while smaller organisations often bear the brunt of cyber crime, it’s the crimes that affect the bigger players that tend to grab the headlines. So what can these high profile data breaches teach the rest of us? We take a look…
There was a time when email was pretty much the sole means of electronic communication used by business. These days, even with the growth of social and a host of specialist messaging and collaboration tools available, email remains as important as ever. There are an estimated 2.5 billion business email users worldwide - and that number is on the increase.
The rise in spear-phishing as a means to deliver potentially devastating malware to businesses has been one of the more troubling trends in cyber-security over the past year. And it’s a trend that looks likely to continue. Although, as experience tells us, these types of threats tend not to stand still, ever evolving to maintain it's capability to cause chaos.