Tag Archives: data security

WikiLeaks’ CIA documents offer us an important reminder

With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.

Continue Reading


Is social engineering the new norm?

Throughout history humans have sought to socially engineer each other, exploiting social norms and applying pressure to reveal information or gain advantage. From travelling conmen and master spies to cyber threats and phishing emails the fundamental problem is the same, humans can be manipulated.

Continue Reading


Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Continue Reading


Responding to a breach: The importance of clear communication

In my last blog, I looked at examples of the commercial impact on a company in the instance of a data breach.

The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.

Continue Reading


Securing the server in today’s threat landscape

We’re often asked how Defendpoint works in a datacenter environment, how customers can achieve the same level of control over servers as they can with their endpoints.

When it comes to data breaches, servers represent one of the largest targets for both external and insider attacks. The risks around servers are often amplified by the fact that users login with highly privileged accounts.

Continue Reading