Opinion
Opinion
Security policy and user awareness
-
Security Think Tank: A good password policy alone is not enough
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Cracking the code – what makes a good password?
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Some basic password guidelines
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Firms need to support good password practices
In the light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: How to create good passwords and add security layers
In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password - and when is a password alone not enough? Continue Reading
-
Security Think Tank: Complex passwords provide a false sense of security
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Use pass phrases and 2FA to beef up access control
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password – and when is a password alone not enough? Continue Reading
-
Security Think Tank: Put more layers around passwords to up security
In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Cyber security – why you’re doing it all wrong
Most organisations can list the IT security tools and controls they have, so why do most of them still get the security basics wrong? Continue Reading
-
Digital transformation is just business change
Don't always start with the technology if you're driving transformation, but always start with the business Continue Reading
-
Security Think Tank: Data controllers are essential in modern business environment
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Data governance is good for business and security
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
Security Think Tank: Five tips for killing the campers on your network
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: Reducing cyber attacker dwell time is critical
Why is reducing cyber attacker dwell time important, and how should it be tackled? Continue Reading
-
Security Think Tank: Use good practice to address cryptojacking risk
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Cryptojacking can be costly
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Six tips for securing your organisation against cryptojacking
How can organisations best defend against cryptojacking? Continue Reading
-
Why businesses must think like criminals to protect their data
Cyber criminals use three main methods of operation to steal commercial data. Understanding their mindset can help organisations put the right defences in place Continue Reading
-
Security Think Tank: User vigilance key to cryptojacking defence
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Fileless malware not totally undetectable
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Human, procedural and technical response to fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Use layered security and patch management to defeat fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Multi-layered security key to fileless malware defence
What should organisations do, at the very least, to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Social engineering at the heart of fileless malware attacks
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: How to tackle fileless malware attacks
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Hawaii missile alert: Why the wrong guy was fired
In January 2018, an employee at Hawaii’s emergency management agency sent out a false alarm of an imminent missile attack, and was subsequently fired – but perhaps poor system design is really to blame Continue Reading
-
Security Think Tank: How to evolve SecOps capacity
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Safer Internet Day: Building online safety practices with young people
Many organisations around the UK are contributing to the important work on making the internet a safer place for everyone Continue Reading
-
Security Think Tank: Automating basic security tasks
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Dmarc email validation – we're doing it all wrong
Dmarc is a hugely important way to reduce email fraud – just ask HMRC – but it also makes email marketing campaigns far more effective Continue Reading
-
Criminal law: Are Twitter threats taken seriously?
As threats of violence become increasingly common online, law enforcement is taking stronger action against the perpetrators Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
-
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading