|
Industry Focus
|
Raising the Standard
Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments | |
|
Comment
|
Bigger phish - and true champions!
Fake news is rife, such as communications of late falsely stating that they were issued by, or in association with, the UN and/or its officials. Can we ever trust any information disseminated in this way? | |
Professionalisation of the Darknet
Movement away from the Darknet, as actors scatter in all directions, is making it ever harder to keep tabs on who is selling what, where and to whom, says Mark Pearce, chief marketing officer, CYJAX | |
A failure to protect
Facebook has suffered several serious data leaks that have left customer data worryingly exposed. Past promises to reform its processes and protect these precious assets seem hollow | |
Eliminating wastage
A thorough risk assessment is essential when deciding where security efforts need to be concentrated, says Eoin Keary, CEO and founder of edgescan | |
Jumping on the Bandwagon
The latest data breach from Facebook is not all that it seems, states Dr Debbie Garside, Group Chief Innovation Scientist/CEO of GeoLang, A Shearwater Group plc Company |
|
|
Research Findings
|
Caught in an endless struggle
Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively
|
|
|
Special Focus
|
The ITAD rebate scam
Jean-pierre Naylor, director, CDL, takes a look at practices relating to redundant IT equipment - PRACTICES he feels give the industry a bad name
|
|
|
Computing Security Awards: A Real Winner!
|
The 2019 Computing Security Awards at the Leonardo Royal Hotel, London City by Tower Bridge in London were a huge success. We expect the 2020 awards to be even bigger and better, judging by the number of top companies already looking to compete and carry off one of our prestigious awards. As the build-up starts to gather pace, take a look at all the winners from last year’s awards at: https://www.computingsecurityawards.co.uk
|
|
|
Product Review
|
Libraesva Email Archiver
Libraesva has a strong pedigree in the email security market and our independent review says that its latest Email Archiver comes up trumps
|
|
SecurEnvoy SecureIdentity DLP
SecurEnvoy, a pioneer in the field of multi-factor authentication (MFA), has turned this expertise to identity, access and data security management - to great effect
|
|
Edgescan
Deployed as a SaaS (software as a Service) solution, edgescan delivers an innovative 'bionic' defence that powerfully combines machine automation with human intelligence
|
|
|
|
Welcome to the January 2020 issue of the Computing Security Newsletter.
Foreign currency seller Travelex was forced recently to take down its website, following a cyber-attack. Although the company said shortly afterwards that an early investigation had been conducted, suggesting there was " no indication that any personal or customer data has been compromised", Travelex resorted to carrying out transactions manually.
Susan Hall, a specialist in information and communications technology, says the company’s response to the attack has been spot on and that other businesses should take note. "Businesses, particularly ones in the financial services sector, have to be prepared to be the focus of a cyber-attack and this is an example, working through in real time, of what seems to be a disaster recovery plan swinging into operation," states Hall, a partner in the intellectual property team at national law firm Clarke Willmott LLP.
"There is a manual alternative to keep services running, clear communication to the public and reassurance about data security. It's particularly admirable, since it’s multinational and occurring at a time where there are likely to be a lot of people off on holiday."
Hall offers a five-point plan for businesses to protect themselves in similar circumstances:
• First step is to develop a good disaster recovery plan for your business. This plan should be constantly refined and updated and, most importantly, it should be tested to check it is fit for purpose
• Response team should be on call 24/7 - cyber criminals don't sleep, so your team can't either!
• Causation, Correction and Communication: analyse what went wrong, correct what went wrong and communicate what you're doing
• Lead from the top: make sure that communications come from a senior source who acts as the company spokesman. It is therefore important to ensure that whoever is on the frontline is appropriately media trained, and confident in dealing with press and public enquiries
• Don't skimp on resources - throw everything at it that's needed.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|