Stuart O'Brien, Author at Cyber Secure Forum | Forum Events Ltd
Posts By :

Stuart O'Brien

5G leads business investment, though general wireless network security concerns remain high

960 640 Stuart O'Brien

Businesses expect wireless technology investment to boost their productivity by 32% on average in the three years after implementation, but latent concerns remain around security and interoperability.

36% of respondents to a Panasonic Connect Europe survey say that 5G is the most important wireless technology investment for their business, with private campus networks more popular than public networks.

One in five (22%) view WiFi 6 as the most important type of wireless technology. A substantial upgrade over its predecessor, it offers faster connections and improved resilience for networks with a high connected device load. Interest in Bluetooth and Long-Range Wide Area Networks (LoRaWAN) were similarly high (21% respectively), as organisations seek the right technology for specialist applications in their own sectors, such as supply chain logistics and manufacturing.

Overall, there is rapid progress being made with investment in wireless technology, with 41% of decision makers having already made the decision to invest in wireless projects, or are in the planning process. An additional 38% of respondents are already at the implementation stage.

However, there are challenges to overcome, with 24% of those surveyed admitting to concerns around IT security, while 22% are worried about interoperability and connectivity issues with their existing IT infrastructure. One in five are troubled about the manageability of the wireless network technology and a similar percentage report a lack of confidence in IT resources, knowledge, and skills.

“This research highlights that this is a crucial period in wireless technology investment and decision making. The advent of 5G, the evolution of WiFi, and the innovation around Bluetooth and LoRaWAN are all driving the connected world in ways that would have been unimaginable just a few years ago. Clearly, business leaders believe wireless connectivity presents enormous opportunities, but there are also challenges to overcome,” said Jan Kaempfer, Marketing Director for Panasonic Connect Europe.

“Businesses have a lack of internal expertise and resources and there is a role for technology providers to play in supporting organisations with expertise and education to instil greater confidence and plug some of the resource gaps. But overall, the picture for wireless is very positive, with a strong appetite for innovation and advanced deployment. At Panasonic Connect Europe, we’re committed to helping business leaders understand the dominant drivers for wireless technology investment, the key technologies and their applications, and how to overcome barriers.”

The survey, carried out by independent research company Opinion Matters and commissioned by Panasonic Connect Europe, questioned over 300 senior decision makers with responsibility for wireless and network technologies, across the UK, France, and Germany, in the following sectors: Retail; Logistics & Supply Chain; Manufacturing; Education; Location-based Media and Entertainment; and Public Sector and Emergency Services.

Photo by Frederik Lipfert on Unsplash

ACCESS CONTROL MONTH: Establishing the key pillars of best practice

960 640 Stuart O'Brien

Implementing an effective access control regime is paramount for IT security professionals in the UK’s public and private sectors. Access control systems are essential for protecting sensitive information, ensuring that only authorised users can access specific data and systems. Here are the key pillars for establishing a robust access control regime, based from input from attendees at the Cyber Secure Forum…

1. Comprehensive Risk Assessment: The foundation of any effective access control regime is a thorough risk assessment. IT security professionals need to identify the critical assets within their organisation, understand the potential vulnerabilities, and assess the threats. This comprehensive evaluation helps in determining the appropriate level of access control required to protect these assets.

2. Least Privilege Principle: One of the cornerstones of access control is the principle of least privilege. This means granting users only the access rights they need to perform their job functions and no more. Implementing the least privilege principle minimises the risk of accidental or intentional data breaches, as it limits the amount of data and systems to which any given user has access.

3. Multi-factor Authentication (MFA): Relying solely on passwords for user authentication is increasingly seen as inadequate. Multi-factor authentication adds an additional layer of security by requiring two or more verification methods to gain access. This could include something the user knows (a password), something the user has (a security token or mobile device), or something the user is (biometric verification).

4. Regular Audits and Reviews: To ensure that access controls remain effective and relevant, regular audits and reviews are essential. This involves checking who has access to what and ensuring that this access is still required. It also includes reviewing the access control policies and procedures to ensure they are up to date with the latest security threats and technological advancements.

5. User Training and Awareness: An often-overlooked aspect of access control is user training and awareness. Users need to understand the importance of access control measures and how to comply with them. This includes recognising phishing attempts, safeguarding their credentials, and reporting any suspicious activity.

6. Integration and Scalability: As organisations grow and evolve, so too do their access control needs. IT security professionals should seek access control solutions that can integrate seamlessly with existing systems and scale as the organisation expands. This ensures a consistent and manageable access control regime across all areas of the business.

An effective access control regime is built on thorough risk assessment, adherence to the principle of least privilege, the implementation of multi-factor authentication, regular audits, user training, and scalable, integrated solutions. By focusing on these key pillars, IT security professionals in the UK can safeguard their organisations against unauthorised access and the myriad of security threats that accompany it.

Are you searching for Access Control solutions for your organisation? The Cyber Secure Forum can help!

Photo by NFT gallery on Unsplash

These are the top trends impacting tech providers in 2024

960 640 Stuart O'Brien
Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider, but ESG and buyer pessimism are also high on the agenda.

Eric Hunter, Managing Vice President at Gartner, said: “[GenAI] technology reshapes a tech provider from its growth and product strategy down to the everyday tools used by its associates. Despite the potential for GenAI to reshape providers, it is not the only influence facing technology leaders. There are new points of friction in growth plans, new points of fusion in marketing and sales, and new relationships opening up to technology and service providers (TSPs).”

The immediate and long-term implications of these issues require product leaders to balance between short-term opportunity and long-term advantage and strategies based on economic recovery or recession. Gartner’s top trends for 2024 reflect these dualities (see Figure 1).

Figure 1: 2024 Gartner Tech Provider Top Trends

Note: The bubble size for each trend conveys the relative magnitude of disruption for a given trend, relative to the other top trends. Source: Gartner (February 2024)

Efficient Growth for High Tech

Significant growth in IT spending over the last decade benefited high-tech companies. Capturing that growth led high-tech firms to pursue growth without a full measure of the costs. This is a “growth at all costs” strategy. High-tech firms anchored their product, organization and employment plans on a hypothesis of continued strong growth.

As macroeconomic conditions create uncertainty among buyers and increasing costs of capital shift investor focus to margin growth, Gartner analysts see a trend toward tech providers focusing on efficient growth. Efficient growth strategies recognize the value in growing in ways that strengthen current margins and future revenue opportunities.

New Enterprise IT-Provider Relationships

Increased business and technical demands require enterprise IT to cover more ground at a deeper level and a faster pace, eroding enterprise IT’s capacity and capabilities. This creates a trend for product leaders at tech providers to create new relationships and revenue opportunities across the enterprise, including expanded provider roles within enterprise IT and the business, outcome-centric provider-enterprise relationships and enterprise-wide tier-1 relationships.

Sustainable Business Grows Up

Sustainability efforts and managing the ESG impact have been unilaterally focused on mitigating internal risk and ensuring compliance. Product leaders must evolve by embracing double materiality and holistic leverage of emerging technologies to meet sustainability objectives.

AI Safety 

Responsible AI and AI safety are not new concepts, but the unprecedented rapid development of GenAI technologies has fueled the discussion around risk management and how to address growing issues such as content provenance and hallucination. Product leaders must build solutions that incorporate safety principles with a focus on model transparency, traceability, interpretability and explainability aspects. Preempting regulatory and compliance issues will be critical to staying competitive in this vibrant GenAI market by creating trust.

Rising Buyer Pessimism 

Over the past three years, tech providers have increasingly observed negative sales pipeline effects due to new buyer behaviors that are colliding with outdated go-to-market (GTM) models. Without adapting sales and marketing approaches to detect and respond to buyer pessimism, technology providers will see their own GTM operations decline in both internal and external perspectives.

Vertical Generative AI Models

While general-purpose models perform well across a broad set of GenAI applications, they can be impractical for many enterprise use cases that require domain-specific data. Tech providers must explore industry-focused models that can be adapted to specific user requirements using available resources more efficiently. Those failing to do so will face increased costs and complexity in the creation and leverage of models.

Personalized Marketplace Experiences  

Specialized, niche, digital marketplaces are emerging to help buyers navigate the complexity of procuring, implementing and integrating solutions. Product leaders who do not offer their services through personalized digital marketplaces limit their findability for their target customers. Gartner predicts that

80% of sales interactions between suppliers and buyers will occur in digital channels by 2025.

Industry Cloud Delivers Growth

Service providers, hyperscalers, ISVs and SaaS providers are turning to vertical solutions to deliver the customer outcomes that will drive provider growth. By 2027, Gartner predicts that more than 50% of tech providers will use industry cloud platforms to deliver business outcomes, up from less than 5% in 2023.

PLG and Value Converge for Hybrid GTM

Product-led-growth (PLG) focuses on showing value to product users, creating intent signals that go-to-market (GTM) teams can use with prospective buyers. But most companies using a PLG GTM have begun to realize that, in most cases, a 100% self-serve GTM motion isn’t tenable. At some point, sellers must be involved to convert deals. Buyer needs for business value and outcome justification — for new or expansion business — will meld PLG tactics with value management and realization initiatives in hybrid GTM strategies.

Precision Marketing and Sales

Rapidly evolving technology advances, such as GenAI, digital buying and the metaverse, are changing how tech providers market and sell technology. Tech providers failing to adopt new approaches will see the erosion of overall deal quality combined with the loss of relevance and limited growth within established accounts.

Photo by Christina @ on Unsplash

ANTI-VIRUS MONTH: Establishing the best protocols for your organisation

960 640 Stuart O'Brien

At a time when cyber threats are increasingly sophisticated and pervasive, establishing robust antivirus defences is crucial for IT professionals in the public and private sectors. The right antivirus strategy can protect critical data and systems, ensuring organisational resilience and compliance with regulatory standards. Here are some top tips for IT professionals to fortify their antivirus defences…

  1. Understand Your Threat Landscape: Begin with a thorough analysis of your organisation’s specific threat landscape. Understanding the types of threats you are most likely to encounter, based on your sector and IT infrastructure, is critical for selecting the right antivirus solutions.
  2. Choose a Comprehensive Antivirus Solution: Opt for antivirus software that offers comprehensive protection. This includes not only traditional signature-based detection but also heuristic analysis, behaviour monitoring, and AI-driven threat detection. A multi-layered approach is key to defending against a wide range of threats, including viruses, malware, ransomware, and zero-day attacks.
  3. Regularly Update and Patch Systems: Ensure that all systems and software, including your antivirus solutions, are regularly updated and patched. Cyber attackers often exploit vulnerabilities in outdated software, so keeping everything up-to-date is a crucial line of defence.
  4. Implement Network Segmentation: Segmenting your network can prevent the spread of viruses if they breach your initial defences. By dividing your network into smaller, controlled zones, you can limit access to sensitive information and contain potential infections.
  5. Educate and Train Staff: Human error is a common entry point for viruses and malware. Regular training and awareness programs for staff can significantly reduce the risk of accidental breaches. Teach employees about safe browsing practices, email hygiene, and the importance of reporting suspicious activities.
  6. Regular Backups and Data Recovery Plans: Regularly back up critical data and ensure you have a robust data recovery plan in place. In the event of a virus attack, having up-to-date backups can be the difference between a minor setback and a major crisis.
  7. Use Firewalls and Email Filters: Complement your antivirus solutions with strong firewalls and email filtering systems. These can help block malicious traffic and phishing attempts before they reach your network or inboxes.
  8. Monitor Systems and Networks Continuously: Implement continuous monitoring of your systems and networks. Early detection of unusual activities can allow you to respond to threats before they cause significant damage.
  9. Conduct Regular Security Audits and Testing: Regular security audits and penetration testing can help identify vulnerabilities in your antivirus defences. These exercises can provide valuable insights for strengthening your security posture.
  10. Stay Informed About Latest Threats: The world of cybersecurity is constantly evolving. Stay informed about the latest threats and trends in antivirus defence, and be prepared to adapt your strategies accordingly.

Establishing robust antivirus defences in today’s digital age requires a comprehensive, informed, and proactive approach. By understanding the threat landscape, choosing comprehensive antivirus solutions, keeping systems updated, educating staff, and continuously monitoring and testing their systems, IT professionals in the UK can create a strong defence against a wide range of cyber threats.

Are you on the hunt for Anti-Virus solutions for your organisation? The Cyber Secure Forum can help!

Photo by Sigmund on Unsplash

How businesses can protect their most valuable asset this Data Privacy Day and beyond

960 640 Stuart O'Brien

With last weekend marking the 18th Data Privacy Day, we sat down with some of the industry’s experts to find out more about why this event is still so important and how organisations can get one step ahead when it comes to protecting their increasingly precious data. Here’s what they had to say…

Samir Desai, Vice President at GTT  

“This year’s Data Privacy Day provides us with yet another reminder of just how important it is for businesses to protect their most valuable asset. However, this is something that, unfortunately, has also never been more difficult.  

“The rapid adoption of cloud computing, IoT/IIoT, mobile devices and remote work has increased both the size and complexity of the networking landscape and cybercriminals are taking advantage of this. Alongside common threats – such as phishing – businesses today must defend against a whole new host of potential risks, such as how generative AI can potentially super-charge phishing attempts by making it easier and faster for bad actors to craft convincing content.  

“To ensure data security for cloud-based apps while still providing reliable connectivity for hybrid workplaces and remote workers, the modern enterprise needs to invest in the right solutions. This may require further collaboration with managed security and service partners to identify and implement the right technologies to protect the ever-expanding perimeter. 

“For example, a Zero-trust networking approach which also combines network security and software-defined connectivity  into a single cloud-based service experience, could be transformative. It’s ‘always-on’ security capabilities means that data is protected, regardless of where resources or end-users reside across the enterprise environment.” 

Ajay Bhatia, Global VP & GM of Data Compliance and Governance, Veritas

“Ironically, Data Privacy Day is a reminder that data privacy isn’t something a business can achieve in a single day at all. Far from that, it’s a continual process that requires vigilance 24/7/365. Top of mind this year is the impact artificial intelligence (AI) is having on data privacy. AI-powered data management can help improve data privacy and associated regulatory compliance, yet bad actors are using generative AI (GenAI) to create more sophisticated attacks. GenAI is also making employees more efficient, but it needs guardrails to help prevent accidentally leaking sensitive information. Considering these and other developments, data privacy in 2024 is more important than ever.” 

Martin Hodgson, Director Northern Europe at Paessler AG

“As our reliance on data continues to grow, protecting it and ensuring the only those who we trust have access to it has never been more important.  

 “Many businesses assume their IT infrastructure is sufficiently protected by a reliable firewall and an up-to-date virus scanner. However, cyber criminals are continually developing more sophisticated methods of accessing company systems and getting hold of sensitive data. Some of these methods – such as trojans – will often only be recognised when it’s already too late.  

“In order to get ahead and avoid the financial and reputational losses associated with such attacks, businesses need to invest in comprehensive security approaches which protect the entire infrastructure. Realtime IT Documentation alongside a network monitoring system – which enables a business to keep track of all devices and systems, regardless of location – can help to spot the early warnings signs of an attack and enable business to get on the front foot when it comes to protecting their increasingly valuable data.”   

Mike Loukides, Vice President of Emerging Tech at O’Reilly:

“How do you protect your data from AI? After all, people type all sorts of things into their ChatGPT prompts. What happens after they hit “send”? 

“It’s very hard to say. While criminals haven’t yet taken a significant interest in stealing data through AI, the important word is “yet.” Cybercriminals have certainly noticed that AI is becoming more and more entrenched in our corporate landscapes. AI models have huge vulnerabilities, and those vulnerabilities are very difficult (perhaps impossible) to fix. If you upload your business plan or your company financials to ChatGPT to work on a report, is there a chance that they will “escape” to a hostile attacker? Unfortunately, yes. That chance isn’t large, but it’s not zero. 

“So here are a few quick guidelines to be safe: 

  • Read the fine print of your AI provider’s policies. OpenAI claims that they will not use enterprise customers’ data to train their models. That doesn’t protect you from hostile attacks that might leak your data, but it’s a big step forward. Other providers will eventually be forced to offer similar protections.
  • Don’t say anything to an AI that you wouldn’t want leaked. In the early days of the Internet, we said “don’t say anything online that you wouldn’t say in public.” That rule still applies on the Web, and it definitely applies to AI.
  • Understand that there are alternatives to the big AI-as-a-service providers (OpenAI, Microsoft, Google, and a few others). It’s possible to run several open source models entirely on your laptop; no cloud, no Internet required once you’ve downloaded the software. The performance of these models isn’t quite the equal of the latest GPT, but it’s impressive. Llamafile is the easiest way to run a model locally. Give it a try

“I’m not suggesting that anyone refrain from using AI. So far, the chances of your private data escaping are small. But it is a risk. Understand the risk, and act accordingly.” 

Attila Török, Chief Security Officer at GoTo:

“As new ways of working and engaging with tech continue to expand the vulnerability landscape and create new pathways for hackers, you’d be hard-pressed to find an IT leader whose number one concern wasn’t cybersecurity. 

 “Bolstering cyber hygiene to stave off threats and protect sensitive data is a top agenda item, especially in a working world where hybrid, dispersed and remote-centric teams are commonplace. In “2024 businesses should be firing on all cylinders to scale up employee security, utilise zero trust products, continue to enforce a strong acceptable use policy (AUP), and move toward passwordless authentication. These are simple yet powerful ways we can improve and modernise current practices to ensure that cyber threats can’t breach company systems. 

“Cybersecurity is a top priority for all businesses—small and large. CTOs, working with CISOs, are responsible for protecting their business, customers, and employees from cyberattacks and data breaches. In 2024, CTOs must continue implementing robust security measures and invest in new cybersecurity technologies, including zero-trust architectures (ZTAs).”

Keiron Holyome, VP UKI and Emerging markets, BlackBerry Cybersecurity 

“AI continues to be a game-changer in data privacy and protection for businesses as well as individuals. We have entered a phase where AI opens a powerful new armoury for those seeking to defend data. When trained to predict and protect, it is cybersecurity’s most commanding advantage. But it also equips those with malicious intent. Its large scale data collection in generative business and consumer applications raises valid concerns for data and communication privacy and protection that users need to be alert to and mitigate.

“A big question at the moment is how legislation can be pervasive enough to offer peace of mind and protection against the growing generative AI threats against data privacy, while not hindering those with responsibility for keeping data safe. BlackBerry’s research found that 92% of IT professionals believe governments have a responsibility to regulate advanced technologies, such as ChatGPT…though many will acknowledge that even the most watertight legislation can’t change reality. That is, as the maturity of AI technologies and the hackers’ experience of putting it to work progress, it will get more and more difficult for organisations and institutions to raise their defences without using AI in their protective strategies.”

Photo by Jason Dent on Unsplash

Cyber Secure Forum: New name, same great concept

960 640 Stuart O'Brien

The Cyber Secure Forum, formerly known as the Security IT Summit, is specifically designed to help you build business relationships directly with pre-qualified, security buyers, via your own bespoke itinerary of 1-2-1 meetings.

All buyers attending will be looking for new suppliers for their upcoming plans and projects.

25th June 2024

Hilton London Canary Wharf

Our Event Partner Packages offer a range of benefits, including:

  • Access to pre-qualified senior delegates with active budgets
  • An itinerary of pre-scheduled 1-2-1 meetings
  • Fully furnished meeting stand (including furniture, lighting and electrics)
  • Networking opportunities throughout the event
  • Food and beverages throughout the event
  • Logo branding at event registration stand
  • Logo branding in the digital Event Guide
  • Social media promotion

Request Full Event Supplier Info

If you have any questions then you can contact Courtney Saggers here.

Access Control

If you specialise in Access Control for IT systems we want to hear from you!

960 640 Stuart O'Brien

Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re an Access Control solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Jenny Lane on

Here’s our full features list:

Feb 2024 – Access Control
Mar 2024 – Intrusion Detection & Prevention
Apr 2024 – Phishing Detection
May 2024 – Advanced Threat Dashboard
Jun 2024 – Browser/Web Security
July 2024 – Authentication
Aug 2024 – Penetration Testing
Sep 2024 – Vulnerability Management
Oct 2024 – Employee Security Awareness
Nov 2024 – Malware
Dec 2024 – Network Security Management
Jan 2025 – Anti Virus

IT Services will be largest recipient of CIO spending in 2024

960 640 Stuart O'Brien

Global IT spending is expected to total $5 trillion in 2024, an increase of 6.8% from 2023, down from the previous quarter’s forecast of 8% growth – and while generative AI (GenAI) had significant hype in 2023, it will not significantly change the growth of IT spending in the near-term.

That’s according to new analysis from Gartner, which predicts that IT Services will become largest segment of spending in this year.

“While GenAI will change everything, it won’t impact IT spending significantly, similar to IoT, blockchain and other big trends we have experienced,” said John-David Lovelock, Distinguished VP Analyst at Gartner. “2024 will be the year when organizations actually invest in planning for how to use GenAI, however IT spending will be driven by more traditional forces, such as profitability, labor, and dragged down by a continued wave of change fatigue.”

IT services will continue to see an increase in growth in 2024, becoming the largest segment of IT spending for the first time. Spending on IT services is expected to grow 8.7% in 2024, reaching $1.5 trillion (see Table 1). This is largely due to enterprises investing in organizational efficiency and optimization projects. These investments will be crucial during this period of economic uncertainty.

“Adoption rates among consumers for devices and communications services plateaued over a decade ago. Consumer spending levels are primarily driven by price changes and replacement cycles, leaving room for only incremental growths, so being surpassed by software and services was inevitable,” said Lovelock. “Enterprises continue to find more uses for technology – IT has moved out of the back office, through the front office and is now revenue producing, until there is a plateau for how and where technology can be used in an enterprise, there cannot be a plateau in enterprise IT spending.”

Table 1. Worldwide IT Spending Forecast (Millions of U.S. Dollars) 

  2023 Spending 2023 Growth (%) 2024 Spending 2024 Growth (%)
Data Center Systems 243,063 7.1 261,332 7.5
Software 699,791 -8.7 732,287 4.6
Devices 913,334 12.4 1,029,421 12.7
IT Services 1,381,832 5.8 1,501,365 8.7
Communications Services 1,440,827 1.5 1,473,314 2.3
Overall IT 4,678,847 3.3 4,997,718 6.8

Source: Gartner (January 2024)

The overall IT spending growth rate for 2023 was 3.3%, only a 0.3% increase from 2022. This was largely due to change fatigue among CIOs. Momentum will regain in 2024, with overall IT spending increasing 6.8%.

Even with the expected regained momentum in 2024, the broader IT spending environment remains slightly constrained by change fatigue. Change fatigue could manifest as change resistance — with CIOs hesitating to sign new contracts, commit to long-term initiatives or take on new technology partners. For the new initiatives that do get launched, CIOs require higher levels of risk mitigation and greater certainty of outcomes.

ANTI-VIRUS MONTH: Moving from reactive to proactive measures

960 640 Stuart O'Brien

In the UK as with anywhere in the world, the commercial and public sectors are constantly under the threat of cyber-attacks, making robust cybersecurity measures, including anti-virus solutions, essential. Over the years, approaches to anti-virus measures have evolved significantly among cybersecurity professionals. This evolution is driven by the changing nature of cyber threats, technological advancements, and the need for more comprehensive security strategies.

Traditionally, anti-virus measures in the UK’s commercial and public sectors were largely reactive. Organisations would deploy standard anti-virus software that primarily relied on signature-based detection to identify and remove known malware. This method was effective against common viruses but struggled to keep pace with the rapidly evolving landscape of cyber threats, particularly those not yet known or identified.

The rise of sophisticated cyber threats, including zero-day exploits, ransomware, and advanced persistent threats (APTs), has necessitated a more proactive and multi-layered approach to anti-virus measures. Cybersecurity professionals now recognise that a single line of defence is insufficient. As a result, there is an increased focus on deploying a combination of traditional anti-virus software with more advanced tools like behavioural analytics, machine learning algorithms, and heuristic-based detection.

Behavioural analytics has become a cornerstone in modern anti-virus strategies. Unlike traditional methods, it does not rely solely on known virus signatures. Instead, it monitors the behaviour of applications and files, flagging any activity that deviates from the norm. This approach enables the detection of malware that might otherwise evade signature-based detection systems.

Machine learning and AI have also been game-changers in anti-virus measures. These technologies allow cybersecurity systems to learn and evolve, improving their ability to detect new and sophisticated threats. By analysing vast datasets, machine learning algorithms can identify patterns and anomalies indicative of cyber threats, enhancing the overall effectiveness of anti-virus measures.

Another key development is the integration of anti-virus measures with wider cybersecurity frameworks. Cybersecurity professionals now emphasise the importance of a holistic security posture that includes network security, endpoint protection, employee training, and robust incident response plans. This integrated approach ensures that anti-virus measures are part of a comprehensive defence strategy, rather than a standalone solution.

Furthermore, the increasing adoption of cloud-based anti-virus solutions reflects a shift towards more flexible and scalable security models. Cloud-based solutions offer the advantages of real-time updates, global threat intelligence, and reduced reliance on local system resources. They also enable more efficient management of anti-virus measures across distributed organisational networks.

In conclusion, the approach to anti-virus measures among the UK’s commercial and public sector cybersecurity professionals has evolved from a reactive, signature-based model to a more proactive, layered, and intelligent strategy. By leveraging advanced technologies and integrating anti-virus measures into broader cybersecurity frameworks, these professionals are better equipped to protect their organisations against an ever-changing landscape of cyber threats.

Are you on the hunt for Anti-Virus solutions for your organisation? The Cyber Secure Forum can help!

Photo by Michael Geiger on Unsplash

Access online courses to boost your cybersecurity skills

960 640 Stuart O'Brien

We have a wide selection of online courses tailored specifically for the IT security sector, enabling you to both amass new skills and improve existing ones in 2024 and beyond – start learning today!

The IT and Personal Development online learning bundle provides you with over 50 courses, which cover all areas of both professional and personal development:

  • CSS Certification Level 1
  • HTML 5 Certification Level 2
  • Introduction to Cloud Computing Certification
  • IT Security Certification
  • Website Development Foundations Certification
  • WordPress Certification
  • How to Handle Criticism at Work Certification
  • How to Improve Your Mental Health Certification
  • Building Your Confidence and Self-Esteem Certification
  • Managing Teams Certification
  • Master Planning Certification

And many more! Find out more and purchase your online bundle here For just £99 +vat (usually £149), you can share the courses with your colleagues over a 12-month period. Additionally, there are a variety of bundles available on all spectrums;

  • Personal & Professional Development
  • Healthcare
  • Sports & Personal Development
  • Human Resources
  • Customer Services
  • Health & Safety
  • Education & Social Care Skills
  • Sales & Marketing
  • IT & Personal Development

Book your courses today and come out of this stronger and more skilled!