Archive for the ‘cyber security’ Category

Hacking Point of Sale

A hands-on guide to achieve better security at point of sale Hacking Point of Sale – A must-have guide for those responsible for securing payment card transactions. Hacking Point of Sale is a book that tackles the issue of payment card data theft head on. It covers issues from how attacks are structured to the […]

Leave a Comment

Comprehensive Cyber Security Risk Management Toolkit

  Govern and manage Cyber Security risk with this unique comprehensive toolkit suite   Comprehensive Cyber Security Risk Management Toolkit Suite – Use the Cyber Security Governance & Risk Management Toolkit for a new, fresh implementation of a comprehensive management system that will also be capable of ISO27001 certification, or take advantage of this toolkit’s […]

Comments (1)

How to Achieve Cyber Resilience

Becoming cyber resilient will give your organization the best chance of defending itself against and surviving from cyber attacks. What does ‘cyber resilience’ mean? Cyber resilience is the ability to repel cyber attacks while protecting critical business assets, rapidly adapting and responding to business disruptions and maintain continuous business operations. So how do I become […]

Leave a Comment

10 Steps To Assess Cyber Security Risk

October is National Cyber Security Awareness Month and it is an opportunity to engage public and private sector stakeholders – especially the general public – to create a safe, secure, and resilient cyber environment. Everyone has to play a role in cybersecurity. Constantly evolving cyber threats require the engagement of the entire nation — from […]

Leave a Comment

Cyber Security Governance & Risk Management Toolkit

The threat from cyber space is real and growing. To strengthen cyber security in your organization, there are several frameworks you can adopt: • ISO/IEC 27001 • ISO/IEC 27032 • PAS 555 • the BIS Ten Steps to Cyber Security • the Cloud Security Alliance’s Cloud Control Matrix These standards and guidance offer, between them, […]

Comments (1)

Your employees aren’t the only threat to InfoSec and Compliance

July 22nd, 2013 by Lewis Morgan  I overheard a conversation the other day, one which left me so stunned that I’ve decided to write about it…. Two men having dinner behind me (I got the impression they were both directors) were discussing the £200k fine the NHS received for losing patient data. Eventually, the conversation […]

Leave a Comment

Boardroom Cyber Watch Report 2013

Download the ‘Boardroom Cyber Watch Report 2013’ Free! Almost 75% of respondents say their customers prefer to deal with suppliers with proven IT security credentials; 50% say customers have enquired about their company’s security measures in the past 12 months.   The ‘Boardroom Cyber Watch 2013’ is the first survey IT Governance has undertaken which […]

Leave a Comment

CyberWar, CyberTerror, CyberCrime

Cyber wars between companies, hacker groups and governments can force entire countries to a standstill. A lone, but sophisticated, hacker can bring global organisations to their knees from just an internet café. The threat isn’t even entirely external; perhaps the greatest threat sits uncomfortably in plain sight – from inside your staff.  Arm yourself with […]

Leave a Comment

Cyber Security Risk Governance and Management

  PAS 555 – Cyber Security Risk Governance and Management What does effective cyber security look like? The many standards and sources of best practice on cyber security tend to focus on delivery (the how). PAS 555:2013 is the new Cyber Security Risk Governance and Management standard, and details what effective cyber security looks like […]

Leave a Comment

Cyber Security and Risk Assessment

Cyber security is the protection of systems, networks and data in cyber space. If your system is connected on the internet, you should know and uderstand the risks of cyber space to take appropriate countermeasures. To understand the risks of cyber security,The first place is to begin with is a risk assessment. By completing a […]

Leave a Comment

Implications of becoming a cybersecurity victim

What are the potential implications of becoming a cybersecurity victim? PWC/DTI Information Security Breaches Survey 2012 93% large businesses suffered security incident last year Average cost of worst incident for large business £110k to £250k The average large organisation had 71 security breaches in the previous year, up from just 45 two years previously. National […]

Leave a Comment

Your Cyber Security Project

by James Warren Internet technologies have revolutionised the way that business is conducted but these innovations expose your business to various cyber security risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management […]

Comments (1)

How public distrust is affecting cyber security strategies

According to this article published in SC magazine ’80 per cent of the UK public implicitly do not trust organisations to keep their data safe; with nearly half (41 per cent) feeling that it has become inevitable their data will be compromised by hackers.’ Do your stakeholders trust you? Consumer confidence in cyber security has […]

Leave a Comment

Advanced Persistent Threats are the main challenge for businesses

Advanced Persistent Threats’ are top infosecurity challenge for businesses in 2013 Mitigating Advanced Persistent Threats (APT) is going to be a main challange and should be the highest of information security priorities for businesses in 2013, according to governance, risk management and compliance firm IT Governance. Latest APT threats should be taken into account in an organization risk assessment […]

Leave a Comment

Cyberattack: dangers, consequences and prevention

Attacks on IT systems can have devastating consequences across industries – among them, the banking and financial sector. In order to protect the best interests of their customers, and the vast tracts of personal data for which they are responsible, banks have already been paying attention to their data protection practices, writes Alan Calder of […]

Comments (1)

Tips for staying safe this Cyber Monday

Cyber Monday deals Cyber Monday, one of the largest online shopping days of the entire year, is coming November 26. The National Retail Federation estimates that shoppers spent more than $1.2 billion last year, doing more than a third of their holiday shopping online. The issue? This influx of activity online, often times during business […]

Leave a Comment

Make October YOUR Cyber Security Month

The US Government has declared this October is the National Cyber Security Awareness Month (NCSAM). The aim of this campaign is to: • Promote cyber security awareness amongst citizens and businesses • Educate individuals and businesses through a series of events and initiatives • Raise cyber awareness and increase the resilience of the nation in […]

Comments (3)

Achieve Best Practice & Win New Business with International IT Standards

International IT Standards help organizations achieve best practice systems and management of their IT processes. Certification against standards can help organizations protect their critical assets, rebuff cyber attacks, help win new business and achieve compliance against regulatory requirements. ISO27001: Cyber Security Standard (Cheapest price on the web) ISO27001 helps businesses create a best in class […]

Comments (1)

Learn how to tackle the Flame

A vicious piece of malware (known as Flame) was uncovered this week and is believed to have infected over 600 targets, be 20 times larger than Stuxnet and to have been backed by state sponsorship. Realize the underground economy of hacking and crimeware with this handy pocket guide. It will provide you with a valuable […]

Leave a Comment

21st Century Chinese Cyberwarfare

The UK’s 2010 National Security Strategy identified cyberattacks as one of the four highest-priority risks faced by the UK. President Obama has declared cybersecurity as one of the most serious economic and national security challenges the US faces as a nation. There is an Advanced Persistent Threat (APT) posed by organised crime and state level […]

Comments (4)