Why it’s time to take new strategies for beating ransomware

(c)iStock.com/Leonardo Patrizi

The sad facts of ransomware are that no-one is immune and attacks are impacting hospitals, schools, government, law enforcement agencies and businesses of all sizes. The increased frequency – and scale – of attacks has organisations thinking differently about their approach to ransomware. According to the FBI, ransomware attacks have increased 35-fold in 2016, resulting in an estimated $209 million paid out every quarter.

In addition, there has recently been a string...

By Jeff Denworth, 26 October 2016, 0 comments. Categories: Privacy, Security, Vulnerabilities.

Microsoft launches cloud services due diligence checklist

(c)iStock.com/cruphoto

Microsoft has launched a cloud services due diligence checklist aimed at providing organisations with more standardised procedures for their potential cloud push.

The checklist is based on the emerging ISO/IEC 19086 standard which focuses on cloud service level agreements, and gives structure to organisations of all sizes and sectors to identify their objectives and requirements, before comparing the offerings of different cloud service providers.

“Cloud adoption is no longer simply a...

By James Bourne, 17 October 2016, 1 comment. Categories: Microsoft, Privacy, Security, SLA.

Two in three CIOs yet to formulate ‘comprehensive’ GDPR strategy

(c)iStock.com/Leonardo Patrizi

Businesses have been warned and they’ve been previously shown up for not having the required knowledge over the European Union General Data Protection Regulation (GDPR) – now, a new piece of research from mainframe firm Compuware argues that more than two thirds of...

By James Bourne, 13 September 2016, 0 comments. Categories: CIO, Data & Analytics, Data Management, Data Sovereignty, Europe, Privacy.

Why vendor lock-in remains a big roadblock to cloud success

(c)iStock.com/LeoWolfert

Despite the clear advantages of cloud, enterprises can be skittish about getting “trapped” in a public cloud vendor. But unfortunately, this may prevent them from achieving success in the cloud, a new survey finds.

According to a Logicworks survey by Wakefield Research, 78% of IT decision makers believe that concerns about vendor lock-in prevent their organisation from maximising the benefits of cloud resources. This...

By Logicworks, 01 September 2016, 1 comment. Categories: Privacy, Security, Vendors.

Microsoft research aims to better utilise encrypted cloud data without privacy fears

(c)iStock.com/maxkabakov

In some instances, encryption is a double-edged sword: if data is encrypted in the cloud, it’s secure, but you can’t get access to it. Yet a new research paper presented by Microsoft may be the first step to changing it.

The paper examines the concept of secure data exchange (SDE), where the aim, as a blog post from Microsoft Research writer John Roach puts it, is to...

By James Bourne, 10 August 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Lack of encryption for sensitive cloud data worrying for businesses, argues Gemalto

(c)iStock.com/Jirsak

Though cloud-based resources are becoming increasingly important to companies’ IT operations and business strategies, only a third of sensitive cloudy data is encrypted, according to the latest research from digital security provider Gemalto.

The findings, conducted in association with the Ponemon Institute, found more than nine in 10 UK firms (92%) don’t encrypt more than three quarters of their sensitive data sent via the cloud, while almost four in 10 (39%) do not encrypt...

By James Bourne, 28 July 2016, 0 comments. Categories: Adoption, Privacy, Security.

IT skills shortage leading to cybersecurity issues, research argues

(c)iStock.com/maxkabakov

If a security system flags up an issue in your organisation and nobody acts on it, is it even an issue? Many organisations are acting that way, according to a report from Skyhigh Networks and the Cloud Security Alliance (CSA).

The research found that security budgets continue to rise – more than half (53%) of the 220 IT and security professionals polled expect their allocations to go up in the coming year – and the myriad of tools at teams’ disposals is a growing...

By James Bourne, 28 June 2016, 0 comments. Categories: Data Management, Data Sovereignty, Privacy, Security.

Data sovereignty: How to shield your business from changing regulations

(c)iStock.com/Tempura

International data privacy regulations can be complex and ever-changing. The invalidation of the Safe Harbour agreement by the European Court of Justice, and the ongoing negotiations about its replacement, means than many companies are now forced to rethink their approach to information governance, without the certainty of knowing exactly which regulations they will need to comply with.

Classifying information that is subject to data privacy regulations, from information that is not, can...

By Gary Weiss, 25 May 2016, 0 comments. Categories: Data & Analytics, Data Management, Data Sovereignty, Infrastructure, Privacy.

Hong Kong overtakes Japan as most mature Asia Pacific cloud nation

(c)iStock.com/luxizeng

Hong Kong is the most ‘cloud-ready’ Asia Pacific nation with an overall ranking higher than that of the US and UK, according to the latest analysis from the Asia Cloud Computing Association (ACCA).

Japan, previously the leader, moved down four places to #5 in the chart with an overall score of 73.0 compared to Hong Kong’s 78.1, with the latter scoring top markets in broadband quality, privacy, and data centre risk. Singapore (76.7), New Zealand (74.4) and Australia...

By James Bourne, 28 April 2016, 2 comments. Categories: Data & Analytics, Data Management, Infrastructure, Privacy, Security.

Businesses suffering from lack of knowledge over GDPR, report finds

(c)iStock.com/BrianAJackson

The updated EU General Data Protection Regulation (GDPR) legislation is coming in the next two years – but businesses are at risk of fines because of gaps in knowledge, according to new research from Trend Micro.

More than a quarter (26%) of companies don’t know how much time they have to become compliant, according to the report which surveyed 100 senior IT decision makers in the UK. Almost one in five (18%) are not currently aware that they face fines, while a third...

By James Bourne, 26 April 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Organisations start to address the subtleties of securing 'as a service' propositions

(c)iStock.com/BlackJack3D

According to a recent Verizon report, 94% of companies expect more than a quarter of their workloads to be in the cloud within two years. The enterprise is moving to a cloud model of IT service consumption and delivery for a variety of reasons: IT organisations can become more responsive to business requirements by scaling up on demand, operations are refocused toward the...

By Jeff Denworth, 01 April 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.

MWC takeaways: Making sure your infrastructure is secure for the connected world

(c)iStock.com/Maciej Noskowski

With Mobile World Congress over for another year, I’ve now had a chance to digest everything that was on show last week. This conference, which is arguably the planet’s best venue for mobile industry networking, looked at the Internet of Things and the connected world, anything and everything from developments such as 5G to newly connected toothbrush devices that ensure consumers brush their teeth as the dentist intended.

What all these new technology innovations...

By Monica Brink, 02 March 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.

Businesses not convinced of keeping up with EU data protection regulation

(c)iStock.com/hh5800

Only one in five companies say they are confident of complying with the upcoming EU General Data Protection Regulation (GDPR), according to new research released by Netskope.

Worryingly the research, which polled more than 500 businesses, found a similar number (21%) expect their cloud providers to handle compliance obligations on their behalf – a fact which is not the case according to the wording of the GDPR.

Only 7% of businesses polled said they had a solution in place for...

By James Bourne, 08 February 2016, 0 comments. Categories: Compliance, Data Management, Data Sovereignty, Privacy.

How cloud providers are fighting the data sovereignty fight for European customers

(c)iStock.com/caracterdesign

For many US-centric cloud providers, Europe is quickly becoming a fierce battleground for their business. Earlier this week, Oracle announced plans to recruit up to 1400 cloudy salespeople across EMEA, while data centres are popping up all over the continent, from Microsoft’s commitment to the UK by the end of 2016 to IBM SoftLayer

By James Bourne, 03 February 2016, 0 comments. Categories: Data Centres, Data Management, Data Sovereignty, Infrastructure, Privacy.

Identity management in the cloud: What does it actually mean?

(c)iStock.com/mihau

Identity management in the cloud? What does this actually mean to us? We don’t yet have an established definition of cloud identity management - and there is not even a Wikipedia page yet, although identity management is well founded. That says it all. I’m going to attempt to draw up a definition.

Using cloud applications has now become commonplace for many organisations. Certainly in education, cloud applications have been used for years, such as Office 365 and various...

By Robert Doswell, 17 November 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

It's time to take your big data strategy beyond the data lake

(c)iStock.com/Bastar

A well-established – and unsettling – metric we anecdotally hear from organisations is that analysts spend 70% or more of their time hunting and gathering data and less than 30% of its time deriving insights.

The promise of big data is to reverse this 70/30 ratio. Organisations striving to build a data lake and use data for competitive advantage are seduced by the opportunity to discover new insights to better target customers, improve operations, lower costs, and discover new...

By Dr. Paul Terry, 12 November 2015, 0 comments. Categories: Big Data, Data & Analytics, Privacy, Security.

Is your data privacy and security bulletproof?

(c)iStock.com/Nomadsoul1

To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you’re in the driver’s seat, and that you didn’t hand over your car keys, along with your corporate data security and privacy, to someone else.

As your company's security expert, you are the one chosen to protect your organisation's data so you should invest in a system that allows you to apply your corporate policies,...

By Saimon Michelson, 11 September 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Data sovereignty and the cloud: How do we fully control data amidst the cloud sprawl?

(c)iStock.com/cherezoff

The problem

One of the basic tenets of cloud computing is the ability to provide access to resources across a geographically dispersed cloud environment. This makes the cloud ideal for global distribution of applications and data. But what about those geographies that have highly restrictive data sovereignty laws or practices, such as Germany, Austria and South Korea? What about governmental bodies attempting to protect information while utilising the cloud?

An interesting example is...

By David Auslander, 09 September 2015, 0 comments. Categories: Big Data, Data & Analytics, Data Sovereignty, Privacy, Security.

Number of cloud apps in the enterprise declines for first time – is IT fighting back?

(c)iStock.com/DragonImages

The average number of cloud apps used per enterprise has declined for the first time, according to the latest data from Netskope.

This shift – which the company notes is “consolidation efforts from IT begin[ning] to take hold” – is exacerbated by the lack of enterprise-grade security in most cloud apps. 89.6% of apps used are not enterprise-ready, and 90% of data loss prevention violations occur in cloud storage apps.

The latter point is of most concern....

By James Bourne, 10 June 2015, 0 comments. Categories: Adoption, Enterprise, Privacy, SaaS , Software, Storage.

Opinion: Sorry, Europe: Data localisation is not the killer app for privacy

(c)iStock.com/maxkabakov

By Kenneth N. Rashbaum, Esq.

This blog post is for informational and educational purposes only. Any legal information provided in this post should not be relied upon as legal advice. It is not intended to create, and does not create, an attorney-client relationship and readers should not act upon the information presented without first seeking legal counsel.

Edward Snowden has unleashed a torrent of activity in the name of data security and...

By Logicworks, 24 March 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Privacy, Security.