Posts Tagged ‘Computer security’

Five ISO 27001 books you should read

Take a plunge into the world of ISO 27001 with these recommended reads by Desislava Aleksandrova As a professional embarking on your first journey implementing ISO 27001, you are probably hungry for knowledge and eager to make progress. While starting a new project may be exciting, it can also be daunting if you lack relevant […]

Leave a Comment

Cyber Resilience Best Practices

RESILIA™ Cyber Resilience Best Practices AXELOS’s new guide RESILIA™ Cyber Resilience Best Practices provides a methodology for detecting and recovering from cyber security incidents using the ITIL lifecycle RESILIA™ Cyber Resilience Best Practices Best guide on Cyber Resilience on the web – Cyber Resilience Best Practices is part of the AXELOS RESILIA™ portfolio. RESILIA™ Cyber Resilience […]

Leave a Comment

Cyber Resilience Implementation Suite

Cyber security is not enough – you need to become cyber resilient   The document toolkits – created by experienced cyber security and business continuity professionals – provide you with all the document templates you’ll need to achieve compliance, whilst the supporting guidance will make sure you find the fastest route to completing your project. […]

Leave a Comment

Most common type of data breaches

Cyber attacks have become a regular occurrence in the last few years; in fact, you can’t turn the news on without some mention of a business suffering an attack. Most attacks are fuelled by criminals looking to steal valuable information, but what type of information is being stolen? According to a report by Veracode, the […]

Leave a Comment

Your employees aren’t the only threat to InfoSec and Compliance

July 22nd, 2013 by Lewis Morgan  I overheard a conversation the other day, one which left me so stunned that I’ve decided to write about it…. Two men having dinner behind me (I got the impression they were both directors) were discussing the £200k fine the NHS received for losing patient data. Eventually, the conversation […]

Leave a Comment

Boardroom Cyber Watch Report 2013

Download the ‘Boardroom Cyber Watch Report 2013’ Free! Almost 75% of respondents say their customers prefer to deal with suppliers with proven IT security credentials; 50% say customers have enquired about their company’s security measures in the past 12 months.   The ‘Boardroom Cyber Watch 2013’ is the first survey IT Governance has undertaken which […]

Leave a Comment

Cyber Security and Risk Assessment

Cyber security is the protection of systems, networks and data in cyber space. If your system is connected on the internet, you should know and uderstand the risks of cyber space to take appropriate countermeasures. To understand the risks of cyber security,The first place is to begin with is a risk assessment. By completing a […]

Leave a Comment

Implications of becoming a cybersecurity victim

What are the potential implications of becoming a cybersecurity victim? PWC/DTI Information Security Breaches Survey 2012 93% large businesses suffered security incident last year Average cost of worst incident for large business £110k to £250k The average large organisation had 71 security breaches in the previous year, up from just 45 two years previously. National […]

Leave a Comment

Your Cyber Security Project

by James Warren Internet technologies have revolutionised the way that business is conducted but these innovations expose your business to various cyber security risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management […]

Comments (1)

How public distrust is affecting cyber security strategies

According to this article published in SC magazine ’80 per cent of the UK public implicitly do not trust organisations to keep their data safe; with nearly half (41 per cent) feeling that it has become inevitable their data will be compromised by hackers.’ Do your stakeholders trust you? Consumer confidence in cyber security has […]

Leave a Comment

Cyberattack: dangers, consequences and prevention

Attacks on IT systems can have devastating consequences across industries – among them, the banking and financial sector. In order to protect the best interests of their customers, and the vast tracts of personal data for which they are responsible, banks have already been paying attention to their data protection practices, writes Alan Calder of […]

Comments (1)

Make October YOUR Cyber Security Month

The US Government has declared this October is the National Cyber Security Awareness Month (NCSAM). The aim of this campaign is to: • Promote cyber security awareness amongst citizens and businesses • Educate individuals and businesses through a series of events and initiatives • Raise cyber awareness and increase the resilience of the nation in […]

Comments (3)

Federal Cyber Attacks Rose In 2010

Federal Cyber Attacks Rose 39% In 2010 Cyber attacks on the federal government increased in 2010 over the previous year, even though the total number of cybersecurity incidents was down overall, according to a new report from the Office of Management and Budget (OMB). There were 41,776 reported cyber incidents of malicious intent in the […]

Leave a Comment

Security 2020: Reduce Security Risks This Decade

  Security 2020: Reduce Security Risks This Decade Identify real security risks and skip the hype. After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality […]

Leave a Comment

DHS Cyber security Watchdogs Miss Hundreds of Vulnerabilities on Their Own Network

Image via Wikipedia By Kevin Poulsen @wired.com The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems, according to the results of an audit released Wednesday. The United States Computer Emergency Readiness Team, or US-CERT, monitors the Einstein intrusion-detection sensors […]

Comments (1)