RESILIA™ – the cyber resilience best practice of the future?
Given the relatively low-key launch of RESILIA in June, it would be easy to dismiss this new cyber resilience best practice as just another one of those schemes or standards that you look at next year...
View ArticleThree pillars of cyber security
It’s a common misconception that cyber security is all about technology (hardware and software). Technology is obviously a massive part of cyber security, but alone it is not enough to protect you from...
View ArticleLack of customer awareness drives poor security standards
Today, hacking is big business. Everything from power plants and prison cells to toys, cars and baby monitors can be hacked. There are a multitude of sites on the Internet showing hacked web cams and...
View ArticleAuthor Podcast: A Manager’s Guide to ISO22301 with Tony Drewitt
May’s book of the month is A Manager’s Guide to ISO22301, which provides a comprehensive, non-technical introduction to business continuity management and the ISO 22301 standard. Drawing on author Tony...
View Article66% of organisations have ineffective cyber incident response plans
Online threats – such as ransomware and DDoS attacks – are increasing in scale and severity every day, but the majority can be easily defended with the right controls and planning. In spite of this,...
View ArticleWorld’s largest transporter of fuel and food products struggling to recover...
Companies across the globe are still feeling the effects of NotPetya, a cyber attack that began in the Ukraine last month, before spreading to organisations in more than 60 countries. Among the biggest...
View ArticleNotPetya: analysts predict £100 million loss for Durex condom giant
Reckitt Benckiser, the maker of Durex, Dettol and Nurofen products, has revealed that its manufacturing and distribution divisions were affected by the NotPetya ransomware attack last month, leaving it...
View ArticleBusiness continuity management reduces the average cost of a data breach by...
Ponemon Institute’s 2017 Cost of Data Breach Study: Impact of Business Continuity Management (BCM), reveals that BCM programmes “can reduce the per capita cost of a data breach, the mean time to...
View ArticleWhat is an ISMS and 9 reasons why you should implement one
At IT Governance we often talk about the benefits of ISO 27001 certification but we don’t always expand on the more immediate benefits associated with implementing an information security management...
View ArticleFallout from NotPetya attack leaves TNT customers furious
The financial and reputational damage of June’s NotPetya attack is mounting for TNT, with the courier overwhelmed by undelivered parcels and angry customers. TNT’s UK staff have told customers that...
View Article4 simple rules for protecting your organisation from data breaches
In the wake of data breaches at Deloitte and Equifax, both caused by basic security failures, it’s clear that people need a reminder of the essential things they should be doing to stay secure. Here...
View ArticleHow much should organisations spend on cyber security?
Cyber attacks and data breaches are becoming so common that all organisations are likely to be hit at some point. Some organisations might use this as an excuse not to invest in cyber security, but...
View ArticleThe world’s largest shipbroker suffers a data breach
Clarksons, the world’s largest shipbroker, is preparing for the fallout from a recent data breach. An investigation has found that unauthorised access was gained through an isolated user account....
View ArticleCyber attacks on critical infrastructure set to increase by 100%
The UK infrastructure could face up to a 100% increase in cyber attacks in the next two years, as the growth in connected Internet systems is providing more surface areas and vulnerabilities for...
View ArticleWrapping up a year in healthcare: WannaCry, NHS Digital and the General Data...
2017 has seen a substantial increase in cyber attacks affecting healthcare organisations. One of the most notable incidents this year was the WannaCry ransomware attack, which is estimated to have...
View ArticleSophisticated cyber attacks are biggest technology concern in 2018
Cyber attacks and breaches are becoming a daily occurrence. In December 2017 we reported that 33.8 million records had been leaked, and in November 2017 there were 59 million records leaked. Targeted...
View Article12 cyber security questions to ask your CISO – free guide
Despite the global spotlight on cyber attacks, many organisations still struggle to get to grips with managing emerging cyber risks in an increasingly technological world. Already burdened with a raft...
View ArticleWhy implementing a business continuity management system is essential
Last year, the headlines were laden with cyber attacks and data breaches. In December alone we recorded more than 40 attacks with 33.8 million leaked records, not to mention the infamous global...
View ArticleOrganisations need to prepare for “cyber shocks”
Most organisations are aware of the catastrophic damage that extreme cyber attacks can cause, but few have put in place appropriate measures to defend and respond to such incidents, according to a new...
View ArticleHow an ISMS can ease the strain on CISOs
“It’s not an easy time to be a CISO,” according to Ponemon Institute’s Dr Larry Ponemon. Chief information security officers (CISOs) are less confident than ever about data security, with 67% of...
View Article