Data breach costs fall despite increased security challenges

The average cost of a serious IT security breach has fallen over the past two years, despite an increase in their frequency and severity, a new report has claimed.

For the first time in seven years the average cost of a breach has decreased, from $7.2m in 2010 to $5.5m last year. Also, the cost per compromised record fell by 10% to $194, the lowest since 2007.

The Ponemon Institute’s research, carried out on behalf of security specialist Symantec, also revealed that negligent employees are still the...

By Matt Henkes, 21 March 2012, 0 comments. Categories: Research, Security.

Apple devices seeping into Corporate IT networks

Apple has quietly been releasing information on now to integrate its growing list of Smart devices with Enterprise IT.

While currently synonymous with consumers or perhaps less kindly termed "masses", the evidence is clear that Macs, iPads and iPhones are infiltrating corporate environments either knowingly or unknowingly.

The recent emergence of Apple’s iCloud via the Lion OS upgrades also allows consumers to synch their personal data including apps, music, videos and e-books to Apple's remote Datacentres.   ...

By VI, 13 March 2012, 0 comments. Categories: Applications, Enterprise, Industry, Security.

How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

Cloudy with a Chance of More Venture

Trust makes the world go round.  Without trust, little is possible. Harry Potter author J.K. Rowling wrote, “Never trust anything that can think for itself if you can’t see where it keeps its brain.” 

Quite fitting when you talk about trusting data that resides in the all-invisible cloud. The age-old argument for whether to self-host or outsource always boiled down to trust.

Cloud data is like the tree in the forest: when someone tampers with it,...

By Victor Cruz, 07 March 2012, 0 comments. Categories: Security, Vendors.

How scammers use your personal data against you

Ever received an email unsolicited (yes we know you get spam) to your work or personal email address? Found an account of yours compromised and that you can’t log in? Gone onto messenger and had messages from someone you don’t know popping up? So just how do they do that? how do they know who you are and how do they get your email or messenger IDs, and is there anything you can truly do about this?

I often see an email in my Hotmail inbox from someone I know that looks out of context, not...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Trends.

Why selecting a 'safe bet' cloud vendor is critical

The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in computing history. Just look at Facebook, which grew to 500 million members in a very short period of time. People readily share within it, many with a limited understanding of the potential risks to their private information.

The ability to make an enhancement and almost instantly put it into the customer’s hands is immensely powerful...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Vendors.

Why Public Clouds are More Secure than Private Clouds

post thumbnail

Conventional wisdom would have you believe that Public Clouds are inherently insecure, and that the only way to meet your organization’s stringent security requirements in the Cloud is to implement your own Private Cloud. Conventional wisdom, you say? Unfortunately, there is precious little wisdom available of any kind when it...

By ZapThink, 08 February 2012, 1 comment. Categories: Big Data, Public, Security, Storage.

Mobile Devices in a Cloud World

Someone recently said to me, “With everything moving to the cloud, mobile device security really isn’t going to matter anymore. Sensitive data will never be stored on the device.” The thinking is that sensitive corporate data will be centrally stored and not held on mobiledevices.  And with the proliferation of 3G and 4G networking, access should be available from almost anywhere. However, this doesn’t mean that we no longer need to worry about security of the endpoint...

By GreenPages Technology Solutions, 27 January 2012, 0 comments. Categories: Security, UnifiedComms.