May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for businesses to deal with issues such as security, compliance, data ownership, training and data management. The new regulation will require, for many of businesses, a fundamental change to their internal...
Read MoreToday’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic approach to protecting and securing their business-critical information. By AJ Thompson, CCO of Northdoor plc.
Read MoreWeak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use personal passwords, meaning they are inevitably putting their corporate network at risk as it is now far easier for cybercriminals to get hold of an individual's’ personal information and, in turn,...
Read MoreCybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications like Telegram and social media platforms to trade valuable personally identifiable data (PII) such as stolen payment card details. By Terry Ray, SVP, Imperva.
Read MoreIdentity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten fraudulent applications were made online. By Steve Cook, VP of business development of EMEA at FaceTec.
Read MoreThe IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter security, that is securing your network. By Scott Nicholson, director at Bridewell Consulting.
Read More