InfoSec News


Secure Information Management

 

 

 

Most people would agree that in recent years, there has been a cultural shift in the way we use technology and yet so many organisations are choosing to ignore that fact when they create their cyber security policies - or neglect to create those policies at all.


Read More →

 

 

 

 

With the General Data Protection Regulation (GDPR) coming into force on the 25th May 2018, data has been at the front of everyone’s minds. Organisations are protecting themselves more than ever but it’s important to realise the cause of the breaches so that you can effectively protect your data.


Read More →

 

In February 2018, the Notifiable Data Breaches (NDB) Scheme was introduced and, in the time since, we’ve had a chance to look at the statistics and see what kinds of changes we should be making in response to data breaches.


The first reporting period showed us that over 50% of the breaches reported have been attributed to human errors and insiders. Data breaches aren’t slowing down and although barriers for external threats are important, it’s clear that more needs to be done to reduce human error and to protect against the insider threat, whether  malicious or accidental.


Read More →

 

In recent years, everyone’s opinions of data have shifted - everyone, not just businesses, are more aware of their privacy and how their personal data is protected. Rightfully so! Data is powerful and it’s appropriate that laws and attitudes reflect that power.

Two thirds of NSW Government agencies aren’t safeguarding their data by monitoring the activities and accounts of people with access to data - it’s this kind of oversight that has prompted new laws. 2018 is seeing some big changes in data and privacy laws all over the world, so how does it affect you and your business?


Read More →

In today's rapidly evolving business environment, every CXO needs to feel that their organisation's information and valuable IP is safe and secure. How do organisations keep abreast of the growing attack surface and exposure that they face?  It's hard not to feel like a sitting duck. An army of Cyber criminals exists in what is an ever increasing, convenient way to wreak havoc. Crime-as-a-Service (CRAAS) is flourishing as the Cyber criminal culture hones its techniques and joins the outsourcing world to earn maximum profits.  Niche specialist Cyber criminals are the norm today with specialities including RansomWare-as-a-Service (RAAS), Malware Installation-as-a-Service (MIAAS) and Cash Out-as-a-Service (COAAS) available freely (scarily so).

Successful protection strategies arise from careful human insight into the approach of the attacker. Human behaviour is still the guiding mechanism to  follow when considering the protection of  your organisation.


Read More →

Since its introduction in 2001, SharePoint has become one of the greatest tools for business and organisations around the globe who depend on the productivity and efficiency of SharePoint to centralise data and information for quick and easy access. Unfortunately, the dawn of a new era in information-based technology has brought a new wave of hackers. While most of us know that there are dangers out there, we don't always take the measures necessary to keep ourselves safe from these online threats.  While we all know that data breaches will funnel you and your company into a spider web of problems, we don't realise the actual impact. The hidden costs of SharePoint data breaches are tremendous, but there are ways to protect yourselves in a changing world.


Read More →

Keeping your data private has always been the fundamental goal of IT security. Today, confidentiality of private data is more critical than ever due to the legal implications of unintended data disclosure. We’ve all read the horror stories about USB drives, backup tapes, or laptops being stolen and costing a company millions in reputational damage, lost revenue and fines.


Read More →


The remedy in the event of a breach

Are you prepared to manage a network security incident? According to some vendors and analysts, it's now a case of when, not if, your company will be breached. Adobe, Target and eBay are just a few of the plethora of organisations that recently fell victim to cyber-attacks.

Incidents are increasing in frequency and complexity; so Incident Response Plans are crucial for helping enterprises prepare for a security event. Unfortunately, many are turning a blind eye to the importance of defining and testing an incident response plan. In fact, 77% of organisations do not have a plan at all, according to a recent NTT Group report.
Read More →

What is the state of your IT security team?

When it comes to incident response, “always be prepared” is a key mantra. Berkeley often presents to security professionals, and one of our favourite questions to ask is, “How many hours per day do you spend at work?”. The usual answer is eight or nine, and even those who spend more are still well behind the people they are battling. Hackers will routinely spend 12, 16 and even 18 hours a day trying to breach someones network. They live, breath, eat and sleep hacking. 


Read More →

A dentist in the Napa Valley (California, USA) has learned the hard way the importance of encryption. Protecting data at rest (live and archived) is just as important as protecting data in use and in motion.


Read More →
Insider Threats Prevention Guide - The hidden risk of business collaboration

Popular Posts

INFOSEC INSIGHTS

/