October 29th, 2014
Last year, 73% of the UK population accessed the internet every day, according to figures from the ONS, and in our workplaces, more and more time is spent online.
Today’s workers expect full access to online content in order to do their jobs effectively. With the rising influence of millennial employees, an increasing number expect to be able to access social media and other personal content at all times too.
- October 13th, 2014
Since the mid 90′s, the internet has had a profound impact on our personal and business lives. It’s transformed how we communicate, how we shop, even how we heat our homes. In an enterprise setting, the internet is the lifeblood of the organization, the engine which keeps everything moving. And yet the World Wide Web, on which we’ve come to depend, can also pose a significant threat if we don’t take the appropriate steps to mitigate its risks.
- October 2nd, 2014
The InfoSec community has gone into overdrive in the last few days dealing with the ‘Shellshock’ bug. There is good reason for this, millions of systems around the globe are vulnerable to this bug which lets attackers run code on that system.
- September 30th, 2014
It’s been a busy year in the cyber security arena so far, and it doesn’t look like the pace will be slowing down. From hacking schemes like Heartbleed to significant data breaches at Home Depot, P.F. Chang’s and the Montana Health Department, criminals are stepping up their game. But as organizations adapt their security strategies in kind, there is one key stakeholder who often goes unnoticed: the end user.
- September 24th, 2014
Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months.
- September 10th, 2014
In an ever-changing threat landscape, knowing how to mitigate attacks, or even where to start, can be a challenge. To help ease that burden, a number of organizations and government bodies have provided recommendations on defending common real-world attacks.