|
Computing Security Awards
|
The build-up to the 2019 Computing Security Awards is now well and truly underway. Those who won last year will be seeking to repeat their success, while those who were contenders will be looking to go one step further next time and carry off the laurels.
Vendors: just a reminder that all those solutions that have been independently reviewed for Computing Security in the year leading up the Awards will be shortlisted for the Editor’s Choice. If you have a solution that you would like to be reviewed, please contact the Computing Security team on 01689 616000.
Here are some more of the winners from 2018: | |
Editor's Choice
WINNER: My1Login - Enterprise IAM My1Login is regarded in many quarters as the UK's most secure, most widely compatible, award-winning enterprise Identity & Access Management solution that enables organisations to mitigate password-related cyber-security risks, control user identities and help meet critical compliance obligations, such as GDPR. For more information, go to: www.my1login.com
| |
The Contribution to CyberSecurity Award
WINNER: Rodney Joffe, Neustar
RUNNER-UP: David Emm, KasperskyLab
Comment from Neustar: We are extremely grateful to all Neustar customers and peers who voted for Rodney Joffe to win this award. Although Rodney has been on the receiving end of various awards, he is absolutely thrilled and humbled to have achieved his first Computing Security Award, recognising a lifetime of dedication to cybersecurity | |
|
Strategy in Action |
|
Inside Track
|
Why 'proper' disposal is more important now than ever
With the introduction of the GDPR regulation in May 2018, organisations responsible for IT disposal had no option but to review their disposal process for WEEE and, in particular, data-bearing assets, as Jean-Pierre Naylor, managing director and owner, Computer Disposals Ltd (CDL), explains | |
|
Industry View
|
Rapid7 swoops in
Rapid7 has acquired NetFort, which provides end-to-end network traffic visibility and analytics across cloud, virtual and physical networks | |
|
Opinion
|
Clever thinking
Gaining insight into every incoming threat is invaluable to a company's security posture and can be gathered through a combination of smart security strategies, as Javvad Malik, security advocate for AT&T Cybersecurity (formerly AlienVault), explains | |
It's showtime again!
Infosecurity Europe is Europe's largest information security event. So, make sure you are there to see all the latest technology and solutions that can help to drive your business forward - and keep it that much safer |
|
CYJAX Intelligence Platform
The CYJAX Intelligence Platform offers an innovative approach to cybersecurity by presenting enterprises with a wealth of cyber threat intelligence |
|
|
|
Welcome to the May 2019 issue of the Computing Security Newsletter.
Due to the vast amount of sensitive data they hold, educational institutions are a key target for cyberattacks. According to a recent report, ethical hackers were able to overcome UK university defences and obtain 'high-value' data within two hours. In fact, universities and research centres have faced repeated attacks from bad actors, with more than 200 institutions reporting more than 1,000 attempts to steal data or disrupt services last year.
As the holiday season approaches, many people tend to travel, and last-minute emails or reports may tempt students and faculties onto shared networks. But with valuable assets and data on public Wi-Fi access comes great security risk and vulnerability.
I note that SecureAuth recommends a number of ways for educational bodies to reduce risk and defend against attacks, advising that they:
Employ secure access control. Username and password combinations are notorious for offering suboptimal security and educational organisations need an approach that protects the end user and sensitive information, while not hindering user experience. “Adaptive authentication is one approach that provides world-class security without impacting usability,” it suggests
Deploy single sign-on authentication. The number of passwords students and staff must manage grows daily, putting security at risk. “However, by adopting a passwordless approach with single sign-on, the user is given a single set of credentials to remember, streamlining secure access to on-premises, mobile, cloud, VPN, and legacy resources, while eliminating stored, passed, or synced credentials.”
Be wary of public Wi-Fi. Public Wi-Fi is not monitored, nor is it secure. “Cybercriminals can see individuals' activity, such as sites logged into, data being transferred and other information of what the user is doing. While away from the campus, staff and students should avoid visiting sites or conducting activity with sensitive or confidential information, such as money transfers, when connected to a public hotspot. Instead, they should wait until access can be achieved on a trusted network.”
As sound advice, of course. As ever, the challenge is most often getting those targeted to follow this!
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|