Where to allocate resources in the cybercrime war

The cost of protecting ourselves against cybercrime can far outweigh the cost of the threat itself, according to a new study led by computer scientists at The University of Cambridge.

At the behest of the UK Ministry of Defence, the research team compiled the first estimate of direct, indirect and defence costs of different types of cybercrime.

The report’s authors, which included experts from Cambridge University, working with colleagues in Germany, the Netherlands, the USA and UK, concluded that...

By Matt Henkes, 18 June 2012, 0 comments. Categories: Compliance, Industry, Regulation, Security.

Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

2012: the year of the cloud

2012. This is the year of the cloud. This is the year that business is realising it needs the cloud. But why?

Efficiencies is the answer.

If surviving the GFC taught us one thing, it’s how to be lean. If business, and especially small business is to survive and even thrive post-GFC, it must learn to operate on a strict diet.

To be lean and mean. This means not just micro-managing your...

By Nathan Elcoate, 23 May 2012, 0 comments. Categories: Economy, Public, Security.

The cloud security question: Benefit or barrier?

Despite perceptions to the contrary, small to medium sized businesses (SMBs) are benefiting from increased IT data security as a result of a move to cloud computing, according to new research from comscore and Microsoft.

The results of the research, carried out among SMBs in Hong Kong, India, Malaysia, Singapore and the US, oppose the perception of security as the Achilles heel of the cloud argument.

The study shows that 35% of U.S. companies surveyed had experienced noticeably higher levels of security since...

By Matt Henkes, 15 May 2012, 1 comment. Categories: Adoption, Best Practice, Security.

Cloud Backup Or Sync?

Whether your data is stored in the cloud, on your desktop or on your server, you should be backing it up at least daily.

There are a myriad of backup options available on the desktop, from Windows NT Backup to Symantec and other more advanced options.

Some are mirror image backups, some are file by file. As well as backing up we should also be testing our restore processes to make sure our...

By Nathan Elcoate, 14 May 2012, 1 comment. Categories: Best Practice, Consumer, Security.

Data breach costs fall despite increased security challenges

The average cost of a serious IT security breach has fallen over the past two years, despite an increase in their frequency and severity, a new report has claimed.

For the first time in seven years the average cost of a breach has decreased, from $7.2m in 2010 to $5.5m last year. Also, the cost per compromised record fell by 10% to $194, the lowest since 2007.

The Ponemon Institute’s research, carried out on behalf of security specialist Symantec, also revealed that negligent employees are still the...

By Matt Henkes, 21 March 2012, 0 comments. Categories: Research, Security.

Apple devices seeping into Corporate IT networks

Apple has quietly been releasing information on now to integrate its growing list of Smart devices with Enterprise IT.

While currently synonymous with consumers or perhaps less kindly termed "masses", the evidence is clear that Macs, iPads and iPhones are infiltrating corporate environments either knowingly or unknowingly.

The recent emergence of Apple’s iCloud via the Lion OS upgrades also allows consumers to synch their personal data including apps, music, videos and e-books to Apple's remote Datacentres.   ...

By VI, 13 March 2012, 0 comments. Categories: Applications, Enterprise, Industry, Security.

How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

Cloudy with a Chance of More Venture

Trust makes the world go round.  Without trust, little is possible. Harry Potter author J.K. Rowling wrote, “Never trust anything that can think for itself if you can’t see where it keeps its brain.” 

Quite fitting when you talk about trusting data that resides in the all-invisible cloud. The age-old argument for whether to self-host or outsource always boiled down to trust.

Cloud data is like the tree in the forest: when someone tampers with it,...

By Victor Cruz, 07 March 2012, 0 comments. Categories: Security, Vendors.

How scammers use your personal data against you

Ever received an email unsolicited (yes we know you get spam) to your work or personal email address? Found an account of yours compromised and that you can’t log in? Gone onto messenger and had messages from someone you don’t know popping up? So just how do they do that? how do they know who you are and how do they get your email or messenger IDs, and is there anything you can truly do about this?

I often see an email in my Hotmail inbox from someone I know that looks out of context, not...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Trends.

Why selecting a 'safe bet' cloud vendor is critical

The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in computing history. Just look at Facebook, which grew to 500 million members in a very short period of time. People readily share within it, many with a limited understanding of the potential risks to their private information.

The ability to make an enhancement and almost instantly put it into the customer’s hands is immensely powerful...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Vendors.

Why Public Clouds are More Secure than Private Clouds

post thumbnail

Conventional wisdom would have you believe that Public Clouds are inherently insecure, and that the only way to meet your organization’s stringent security requirements in the Cloud is to implement your own Private Cloud. Conventional wisdom, you say? Unfortunately, there is precious little wisdom available of any kind when it...

By ZapThink, 08 February 2012, 1 comment. Categories: Big Data, Public, Security, Storage.

Mobile Devices in a Cloud World

Someone recently said to me, “With everything moving to the cloud, mobile device security really isn’t going to matter anymore. Sensitive data will never be stored on the device.” The thinking is that sensitive corporate data will be centrally stored and not held on mobiledevices.  And with the proliferation of 3G and 4G networking, access should be available from almost anywhere. However, this doesn’t mean that we no longer need to worry about security of the endpoint...

By GreenPages Technology Solutions, 27 January 2012, 0 comments. Categories: Security, UnifiedComms.

Microsoft addresses privacy concerns on both sides of the Atlantic

Microsoft has made its Office 365 cloud-based service more attractive to US and European customers concerned with legal issues around data sovereignty.

The company has added support for the European Commission’s “Model Clauses”, which regulate how personal data is stored even when the physical location of the data storage lays beyond the borders of the European Economic Area.

Model clauses, introduced in 2010, assure customers that appropriate steps have been taken to help safeguard personal...

By Matt Henkes, 15 December 2011, 0 comments. Categories: Compliance, Regulation, Security, Storage.