Posts Tagged ‘Computer security’

Start as you mean to go on: the top 10 steps to securing your new computer

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats. With Windows 11 making headlines for all the right reasons, it could be a great time to invest in a new PC for the family or the home office. […]

Leave a Comment

edX Courses | View all online computer science courses on edX

Find online courses from top universities. Search all edX MOOCs from Harvard, MIT and more and enroll in a free course today. Source: edX Courses | View all online courses on edX.org   Download a Security Risk Assessment Steps paper! Security Risk assessment Quiz – Find Out How Your security risk assessment Stands Up! DISC […]

Leave a Comment

Five ISO 27001 books you should read

Take a plunge into the world of ISO 27001 with these recommended reads by Desislava Aleksandrova As a professional embarking on your first journey implementing ISO 27001, you are probably hungry for knowledge and eager to make progress. While starting a new project may be exciting, it can also be daunting if you lack relevant […]

Leave a Comment

Cyber Resilience Best Practices

RESILIA™ Cyber Resilience Best Practices AXELOS’s new guide RESILIA™ Cyber Resilience Best Practices provides a methodology for detecting and recovering from cyber security incidents using the ITIL lifecycle RESILIA™ Cyber Resilience Best Practices Best guide on Cyber Resilience on the web – Cyber Resilience Best Practices is part of the AXELOS RESILIA™ portfolio. RESILIA™ Cyber Resilience […]

Leave a Comment

Cyber Resilience Implementation Suite

Cyber security is not enough – you need to become cyber resilient   The document toolkits – created by experienced cyber security and business continuity professionals – provide you with all the document templates you’ll need to achieve compliance, whilst the supporting guidance will make sure you find the fastest route to completing your project. […]

Leave a Comment

Most common type of data breaches

Cyber attacks have become a regular occurrence in the last few years; in fact, you can’t turn the news on without some mention of a business suffering an attack. Most attacks are fuelled by criminals looking to steal valuable information, but what type of information is being stolen? According to a report by Veracode, the […]

Leave a Comment

Your employees aren’t the only threat to InfoSec and Compliance

July 22nd, 2013 by Lewis Morgan  I overheard a conversation the other day, one which left me so stunned that I’ve decided to write about it…. Two men having dinner behind me (I got the impression they were both directors) were discussing the ÂŁ200k fine the NHS received for losing patient data. Eventually, the conversation […]

Leave a Comment

Boardroom Cyber Watch Report 2013

Download the ‘Boardroom Cyber Watch Report 2013’ Free! Almost 75% of respondents say their customers prefer to deal with suppliers with proven IT security credentials; 50% say customers have enquired about their company’s security measures in the past 12 months.   The ‘Boardroom Cyber Watch 2013’ is the first survey IT Governance has undertaken which […]

Leave a Comment

Cyber Security and Risk Assessment

Cyber security is the protection of systems, networks and data in cyber space. If your system is connected on the internet, you should know and uderstand the risks of cyber space to take appropriate countermeasures. To understand the risks of cyber security,The first place is to begin with is a risk assessment. By completing a […]

Leave a Comment

Implications of becoming a cybersecurity victim

What are the potential implications of becoming a cybersecurity victim? PWC/DTI Information Security Breaches Survey 2012 93% large businesses suffered security incident last year Average cost of worst incident for large business ÂŁ110k to ÂŁ250k The average large organisation had 71 security breaches in the previous year, up from just 45 two years previously. National […]

Leave a Comment

Your Cyber Security Project

by James Warren Internet technologies have revolutionised the way that business is conducted but these innovations expose your business to various cyber security risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management […]

Comments (1)

How public distrust is affecting cyber security strategies

According to this article published in SC magazine ’80 per cent of the UK public implicitly do not trust organisations to keep their data safe; with nearly half (41 per cent) feeling that it has become inevitable their data will be compromised by hackers.’ Do your stakeholders trust you? Consumer confidence in cyber security has […]

Leave a Comment

Cyberattack: dangers, consequences and prevention

Attacks on IT systems can have devastating consequences across industries – among them, the banking and financial sector. In order to protect the best interests of their customers, and the vast tracts of personal data for which they are responsible, banks have already been paying attention to their data protection practices, writes Alan Calder of […]

Comments (1)

Make October YOUR Cyber Security Month

  The US Government has declared this October is the National Cyber Security Awareness Month (NCSAM). The aim of this campaign is to: • Promote cyber security awareness amongst citizens and businesses • Educate individuals and businesses through a series of events and initiatives • Raise cyber awareness and increase the resilience of the nation […]

Comments (3)

Federal Cyber Attacks Rose In 2010

Federal Cyber Attacks Rose 39% In 2010 Cyber attacks on the federal government increased in 2010 over the previous year, even though the total number of cybersecurity incidents was down overall, according to a new report from the Office of Management and Budget (OMB). There were 41,776 reported cyber incidents of malicious intent in the […]

Leave a Comment

Security 2020: Reduce Security Risks This Decade

  Security 2020: Reduce Security Risks This Decade Identify real security risks and skip the hype. After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality […]

Leave a Comment

DHS Cyber security Watchdogs Miss Hundreds of Vulnerabilities on Their Own Network

Image via Wikipedia By Kevin Poulsen @wired.com The federal agency in charge of protecting other agencies from computer intruders was found riddled with hundreds of high-risk security holes on its own systems, according to the results of an audit released Wednesday. The United States Computer Emergency Readiness Team, or US-CERT, monitors the Einstein intrusion-detection sensors […]

Comments (1)

Cyber attacks against Water, Oil and Gas Systems

Image via Wikipedia “This summer the Norwegian National Security Authority (NSM) discovered for the first time targeted computer attacks directed against internal process and control systems to ensure supply of electricity and water. Similar attacks were discovered in Germany and Belarus. EU’s cyber-security unit, ENISA, will in late October or early November carry out the […]

Leave a Comment

DHS Quietly Dispatching Teams to Test Power Plant Cybersecurity

Image via Wikipedia The Department of Homeland Security is quietly creating teams of experts charged with assessing the cyber security needs of power plants in the U.S. The question is why the secrecy? When plants vulnerabilities are known facts in both security and hacker communities, perhaps it is time to pay attention or impossible to […]

Leave a Comment

Hacker finds a way into ATM computers

Image via Wikipedia Understanding and Managing Cybercrime by Jordan Robertson A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them. The attacks demonstrated Wednesday at a security conference were done at stand-alone ATMs. But they could potentially be used against the ATMs operated by mainstream banks, […]

Comments (1)