Could your most trusted employee be your biggest threat?

95% of cyber security breaches are due to human error, which in reality means it could be any user, at any time. The best bit? They probably won’t even know they’re doing something wrong, but they have inadvertently just become an unintentional insider threat. As Andy Pearch, Head of IA Services, CORVID, explains, organisations need to stop playing […]
Ramnit Trojan resumes attacks on European financial institutions

The Ramnit banking Trojan has returned to its old hunting ground after recent forays into the e-commerce space, The discovery follows analysis by F5 Labs and F5’s EMEA-based F5 Security Operations Center (SOC) examining active Ramnit banking Trojan Malware configurations in February and March 2019. All signs indicate that Ramnit’s authors are —once again—largely targeting financial services websites to […]
Petition launched for mandatory IT security levels in business

A petition has been launched urging the Government to establish a mandatory minimum level of IT security for all businesses. Cyber crime among UK businesses no costs over £21 billion each year. The petition, launched by Evaris, aims to make the currently optional National Cyber Security Centre’s (NCSC) Cyber Essentials Scheme compulsory for businesses to […]
Cybersecurity’s biggest asset: Why use the cloud?

The cloud is one of those hot buzzwords that gets thrown around a lot both in the tech world and in our daily lives. No longer reserved for IT departments alone, the cloud has become something that we depend upon greatly, especially in the way companies go about their business. And it’s about to become […]
Cybersecurity and Financial Services – How Can Organisations Combat the Threat?

By Genevra Champion, Sector Marketing Manager, IT Governance The financial services industry is naturally a lucrative target for cyber criminals. Financial organisations trade and control vast amounts of money, as well as collect and store customers’ personal information so clearly, a data breach could be disastrous for an industry that is built on trust with its customers. The financial services industry is […]
Time running out to claim your FREE VIP ticket

Time is running out for you to claim your free place at the Security IT Summit – We have just 3 free VIP tickets left! This unique event takes place on July 2nd at the Hilton London Canary Wharf. Register here for the following benefits: Meet with innovative suppliers for a series of face-to-face, pre-arranged […]
Shadow IT is everywhere – are you at risk?

By EveryCloud Cloud services – SaaS and IaaS – are everywhere. Businesses rely on their flexibility and the productivity they deliver. But what about the cloud services you don’t see? Business-led cloud services, or “Shadow IT”, have sprung up in dozens of departments and project teams. In every corner of the business and outside the […]
Accountancies take lion’s share of cyber security recruitment

The UK’s so-called ‘Big Four’ accountancy firms account the for majority of cyber security recruitment in the country. Job search site Indeed.com has released data that shows PwC, KPMG, EY and Deloitte take the top four places in its Top 10 ranking, ahead of the likes of Vodafone, Aviva and Barclays (see table below). Indeed […]
Survey reveals increasing IT investment in containers

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers. That’s up considerably from two years ago, when just 67 percent of teams were running container technologies in production, according to the […]
INDUSTRY SPOTLIGHT: CurrentWare AccessPatrol

Use the latest technology to prevent employees causing data breaches Data theft can rob you of thousands of dollars and countless hours of hard work and effort. So how should a company protect itself from cyber threats? CurrentWare’s AccessPatrol helps secure company endpoints like USBs, DVDs, Bluetooth devices. AccessPatrol allows you to generate comprehensive reports that highlight endpoint device usage […]