-
Building A Successful Application Security Strategy
There are essentially four steps to building an application security strategy. The first is to convince senior management that it’s essential and to get the whole of the organisation committed. The second is to ensure that development teams have the required level of security skills which may mean investment in training and recruitment. Thirdly…Read more
-
A Guide To Securing Data In The Cloud For PaaS, SaaS & IaaS
In some organisations there’s a perception that Cloud Transformation Programs can do away with security and be led by business stakeholders with a cursory security light touch that ticks their box. This attitude creates a disproportionate imbalance between the business and security. It is often characterised by…Read more
-
Running Phishing Training
There are different types of phishing awareness training tools, with various levels of sophistication. The most basic will simply allow you to compose an email and provide an address. More advanced tools allow you to run several different campaigns at the same time and will…Read more
-
Pharma Cyber Security
Understanding the types of data that hackers deem as valuable is a perpetual challenge but one that must be undertaken to understand pharma cyber security. The pharmaceutical industry is a prime target for hackers/cybercriminals, who may look to steal…Read more
-
Intellectual Property Protection
Intellectual Property protection is now a crucial aspect of your organisation’s cyber security. Initially, it can be hard to understand what IP is. It is possible to be prosecuted for theft for taking one of the following categories of IP…Read more
-
Password Management Software
It doesn’t matter how difficult the password might be to guess – if a security breach on one site occurs, all accounts created with the same password become vulnerable. The obvious solution for easy password management might be to go for…Read more
-
The Importance of Internal Security Awareness Training Programmes
The effectiveness of security awareness training is something that is the subject of some debate among professionals. What is not open for debate is that keeping employees educated and up-to-date about cybersecurity is vital, given the sophistication and volatility of today’s threat landscape.…Read more
-
Generating Business Value with Cyber Security
How can organisation can leverage cyber security to generate business value? It’s now the case that being seen to take systems security seriously can, in fact, help the business to prosper in a competitive environment. In a world of increasingly interlinked systems, this is important. If you are going to…Read more
-
Cyber Effectiveness – Which Cyber Security Framework?
A cyber security framework is a way to improve an organisation’s existing security defences by making use of the experience and wisdom of other professionals and organisations. With an increased focus on how to prevent and deal with cyber-attacks, there are several frameworks…Read more
-
Why The Mid-Market Needs To Be Cyber Security Aware
Why Are UK Mid-market businesses susceptible to cyber attacks? For a moment let’s consider a notional Mid-market company that designs and manufactures a key component that goes into a globally popular piece of consumer electronics. The company is a successful and growing business with plans for …Read more
-
Managing Security Risk as a SME
So, what can a SME do to protect themselves and ensure they have the right security in place that they don’t get caught out? The first step is to understand what information they hold and why, where and how they do so. This means conducting an…Read more
-
How Good Cyber Security Supports Small Business Growth
Securing IT systems is often seen as a necessary evil and a cost on the business. But can cyber security contribute to business growth? We are all aware of the need to protect sensitive information and drivers such as ‘Supply Chain Security’, and new data privacy legislation such as GDPR makes that more of an imperative. The key point here is…Read more