COMPUTING SECURITY AWARDS
|
|
At a gala event in October, the top talent captured the honours in the 2017 Computing Security Awards. The full list of our 2017 awards winners can be seen by going to: www.computingsecurityawards.co.uk |
|
Features
|
Securing email is essential
Colin Tankard, managing director, Digital Pathways, offers his insights on keeping such a vital communications tool as email safe |
|
Health Check: a varied prognosis
While many businesses recognise the need for tight cyber security, there remain areas of real neglect, a government report states
|
|
Outside in
Do managed security services providers really have superior expertise and deliver this to a business at a fraction of the cost of in-house security resources? Or is it more a matter of ‘horses for courses’? |
|
You don't have to be a victim
Computing Security investigates how businesses can keep themselves safe from targeted attacks. One suggested approach is to assume that the attackers will gain access and, from there, think exactly like the hackers do |
|
CYJAX Achieves ISO 27001 Certification
CYJAX, the award-winning cyber threat intelligence company, has become what is said to be the first organisation of its type in the world to achieve ISO 27001 certification |
|
Reviews
|
Red Sift OnDMARC
Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.
|
|
Malwarebytes Endpoint Protection
Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.
|
|
|
|
Welcome to the December 2017 issue of the Computing Security Newsletter.
At a time of growing anxiety about the level of breaches that are occurring – with high profile after high profile organisation revealed to have suffered a serious breach – it’s little wonder that in Frost & Sullivan’s recent survey covering end-user perspectives on navigating digital transformation some 54% of IT professionals cited cybercrime and espionage as their top challenges.
Following hard on their heels were followed by systems integration, with other noteworthy findings including significant IT investment in productivity, improving digital presence, as well as communications/collaboration tool integration with other business software (Microsoft Office, Google-G-suite, CRM, ERP) and vertical applications.
Frost & Sullivan’s research survey, ‘An End-User Perspective on Navigating Digital Transformation, Europe, 2017’, finds that the top benefits seen by organisations deploying Internet of Things technologies include boosting customer service and marketing and automating manual processes.
The survey aimed to understand the IT-related challenges facing organisations; monitor the status of digital transformation, including newer solutions such as AI, AR/VR, and mCommerce; assess current and future uses of business communication technologies; evaluate drivers behind investments in communication technology; appraise IT budgets; and gauge IT and communication trends.
What is clear is that security has to be part of the whole package. Aspiring to excel in any or all of the other areas is to little avail, if the business is brought to its knees by a cyber-criminals, for example. Only a comprehensive strategy that embraces the business in its entirety will keep organisations safe and allow it to thrive.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|