Why it’s still important to educate your employees around cloud security, VPNs, and Wi-Fi

(c)iStock.com/themacx

Sponsored For those at the coalface of the security industry, the feeling of metaphorically banging one’s head against a brick wall, of continually educating, re-educating and correcting misinformation, mischievous or otherwise, will feel all too familiar.

Take the comments from Home Secretary Amber Rudd around WhatsApp following the terror attack in Westminster. Following the disclosure that the messaging service was used moments before the attacker struck, Rudd’s remarks –...

By James Bourne, 11 April 2017, 2 comments. Categories: Consumer, Data & Analytics, Security, Vulnerabilities.

Security monitoring remains ‘complex and chaotic’ – and cloud and IoT will only make it worse

One in three respondents in a survey conducted by AlienVault said the state of security monitoring in their organisation was ‘complex and chaotic’, adding a ‘major disconnect’ was still in place between beliefs and actions in cloud security.

The survey, conducted at the RSA conference in San Francisco back in February, polled 974 attendees. One in five (21%) admit they don’t know how many cloud applications are being used in their organisation, while 39% say it is more than 10....

By James Bourne, 31 March 2017, 0 comments. Categories: Data Management, Security, Vulnerabilities.

There’s no such thing as a free lunch: Why business needs to understand cloud threats

Businesses across the country have bought into the extraordinary benefits of cloud computing. Senior executives have become passionate advocates, attracted by the promise of greater agility, cost savings and convenience. It is no surprise that global spending on public cloud services will reach $141bn by 2019. But business leaders are less well informed when it comes to the risks the cloud can introduce to enterprise environments.

That’s why IT needs to...

By Piers Wilson, 30 March 2017, 0 comments. Categories: Data & Analytics, Data Management, Security, Vulnerabilities.

Overcoming cybersecurity challenges with managed IT services

If there is one thing we can be certain about when it comes to cybersecurity, it’s that the landscape will remain dynamic and turbulent over the coming years. Today, news headlines are dominated by cyberattacks and breaches that span across all industries – causing security to be top of mind for almost all businesses. However, these headlines don’t seem to be slowing down, which means that businesses are still struggling to keep up with the rapidly evolving threat landscape.

So, what are the...

By Continuum Managed Services, 28 March 2017, 0 comments. Categories: Data & Analytics, Enterprise, Security, Vulnerabilities.

A guide: Using SmartNICs to implement zero-trust cloud security

In an age of zero-trust security, enterprises are looking to secure individual virtual machines (VMs) in their on-premise data centres, cloud or hybrid environments to prevent increasingly sophisticated attacks. The problem is that firewalling individual VMs using tools like software appliance firewalls or Connection Tracking (Conntrack) is operationally challenging to manage. It delivers bad performance, restricting VM mobility and consuming many CPU cycles on servers, which limits their ability to process...

By Abhijeet Prabhune, 23 March 2017, 0 comments. Categories: Data Centres, Data Loss, Infrastructure, Security, Vulnerabilities.

How on-demand cloud is contributing to the ransomware problem

“Attention! All your files have been encrypted.” More and more businesses are being greeted with messages such as this one, with ransomware attacks against businesses having increased threefold last year.

Advice for preventing ransomware – which is malicious software that encrypts devices or data until the owner pays a ransom in exchange for access to their data – is...

By Matt Kingswood, 09 March 2017, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

Eseye on embracing cloud, Amazon Web Services, and the IoT

(c)iStock.com/DrAfter123

“We changed our business model to align with cloud,” explains Nick McNamara, VP sales Europe at connectivity provider Eseye.

The company has doubled down on both the Internet of Things (IoT) and Amazon Web Services (AWS) strategically, as McNamara, speaking at the IoT Tech Expo event last week, explains. “All connectivity providers, whether you’re an MNO, an MVNO, or like us a smart MNO, sell megabytes per month,” he says. “We no longer sell megabytes...

By James Bourne, 31 January 2017, 0 comments. Categories: Amazon, Applications, Data Sovereignty, Security, Vulnerabilities.

Building your data castle: Protecting from ransomware and restoring data after a breach

(c)iStock.com/Pobytov

The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks.

No longer is it a matter of pride and peer recognition in the hacker community for circumnavigating and exposing the security of an organisation because it is now a fully-fledged industry in its own right with the use of ransomware.  That cybersecurity company...

By David Trossell, 11 January 2017, 0 comments. Categories: Data Centres, Data Management, Security, Vulnerabilities.

Preparing for a year of ‘unknown unknowns’ in cyber security

(c)iStock.com/tonefotografia

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s going away in 2017. In fact, we’re starting to see continued and varied threats, most...

By Mike East, 07 December 2016, 0 comments. Categories: Security, Vulnerabilities.

How software asset management needs to adapt to changing cloud conditions

(c)iStock.com/whiteson

A new report issued today by Flexera Software argues that software asset management (SAM) needs to evolve to keep up with software as a service (SaaS) and virtualisation moving into the mainstream.

The study, which polled almost 500 respondents answering questions on enterprise and application production, found that for 20% of respondents, more than a quarter of their software is SaaS-based, while 39% say more than a quarter is virtualised. Interestingly, while three quarters say 80% or...

By James Bourne, 06 December 2016, 0 comments. Categories: Research, Security, Software, Vulnerabilities.

The key to defending your data centre against the Internet of Things

(c)iStock.com/4x-image

Opinion The Internet of Things has the potential to revolutionise society once it surmounts its initial growing pains. Unfortunately, one of those involves security.

DDOS attacks are one of the oldest and most enduring things on the web, like that creepy uncle who no one can get rid of at family reunions. And like that uncle, they’re getting progressively worse as time goes on. This past summer saw the largest DDOS attack in history, one so large that it forced content delivery network...

By Tim Mullahy, 01 December 2016, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security, Vulnerabilities.

Protecting against ransomware in the cloud: A guide

(c)iStock.com/Maciej Noskowski 

A recent survey of 500 businesses revealed that nearly half were brought to a standstill by a ransomware attack within the last 12 months. Ransomware is computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to decrypt it or to not publish it.

Recently, there has...

By Justin Giardina, 29 November 2016, 0 comments. Categories: Data Management, Security, Vulnerabilities.

Advanced cloud security: Standards and automation in a multi-vendor world

(c)iStock.com/maxkabakov

Enterprise IT has long struggled to develop common standards for the security of cloud deployments. With multiple cloud vendors, fast-moving product teams, and a changing security landscape, it is perhaps no wonder that enterprises are left asking:

  • What is the right cloud security standard?
  • What level of security is “good enough”?
  • And most importantly — how do we apply these standards in a consistent way to existing and new cloud environments?

In July 2016, the Ponemon Institute published 

By Logicworks, 27 October 2016, 1 comment. Categories: DevOps, Security, Vendors, Vulnerabilities.

Why it’s time to take new strategies for beating ransomware

(c)iStock.com/Leonardo Patrizi

The sad facts of ransomware are that no-one is immune and attacks are impacting hospitals, schools, government, law enforcement agencies and businesses of all sizes. The increased frequency – and scale – of attacks has organisations thinking differently about their approach to ransomware. According to the FBI, ransomware attacks have increased 35-fold in 2016, resulting in an estimated $209 million paid out every quarter.

In addition, there has recently been a string...

By Jeff Denworth, 26 October 2016, 0 comments. Categories: Privacy, Security, Vulnerabilities.

How cloud and IoT services are driving deployment of public key infrastructures

(c)iStock.com/cherezoff

A new study from Thales and the Ponemon Institute has found that, for more than three in five businesses polled, cloud-based services were the biggest trend driving the deployment of applications using public key infrastructures (PKI).

PKI refers to the ability for users and organisations to send secure data over networks; as defined by TechTarget, it “supports the distribution and identification of public encryption...

By James Bourne, 11 October 2016, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

Netskope research shows how cloud malware and ransomware remain issues

(c)iStock.com/DundStock

According to the latest research from cloud security provider Netskope, almost 44% of malware found in cloud apps have delivered ransomware, while almost 56% of malware-infected files in cloud apps are shared publicly.

The study, which appears in the company’s latest Netskope Cloud Report, found that the number of cloud apps keep going up in enterprises; 824 on average, up from 777 during the last quarter. Microsoft continues to beat Google as the most popular cloud app, with...

By James Bourne, 08 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.

Dropbox says password reset measures have worked following leak revelations

(c)iStock.com/KIVILCIM PINAR

Cloud storage provider Dropbox has said the password reset measures the company put in place has prevented any hacking of user data, following revelations made in stories which argued that millions of account details had been accessed.

Certain Dropbox users received an email from the cloud storage provider earlier this week advising that if their account password was the same as before mid-2012, they will be prompted to change it the next time they sign in.

A blog post at the time from Patrick...

By James Bourne, 31 August 2016, 0 comments. Categories: Data Management, Security, Software, Storage, Vulnerabilities.

The top 100 best practices in big data – revealed

(c)iStock.com/ismagilov

The Cloud Security Alliance (CSA) has today released a mammoth document detailing the 100 best practices in big data security – running the gamut from traditional cybersecurity measures to cutting edge cryptographic technologies.

The document discusses each tip at more of a cursory than comprehensive level, offering a few sentences on why and how organisations should implement them. The report goes through 10 areas with 10 tips for each, from real-time security and compliance...

By James Bourne, 26 August 2016, 1 comment. Categories: Big Data, Data & Analytics, Security, Vulnerabilities.

Why cloud security best practices mean engagement from vendors and employees

(c)iStock.com/StockFinland

Ransomware may be the hot topic in the news at the moment, but human error is a greater threat. Human error, in fact, is often the reason ransomware is able to infiltrate a network (by staff members clicking phishing links, for example). It’s also one of the greatest causes of data loss in the cloud. The first part of this series discussed how cloud vendors, shadow...

By Matt Kingswood, 08 July 2016, 0 comments. Categories: Data & Analytics, Data Management, Security, Vendors, Vulnerabilities.

A disaster recovery plan: What is your IT team keeping from you?

(c)iStock.com/Dimitrios Stefanidis

Your disaster recovery program is like a parachute - you don’t want to find yourself in freefall before you discover it won’t open. But amid hastening development cycles, and cost, resource and time pressures, many CIOs are failing to adequately prioritise DR planning and testing.

While IT teams are running to stand still with day-to-day responsibilities, DR efforts tend to be focused solely on infrastructure, hardware and software, neglecting the people and...