New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Does your organisation need a chatbot or a digital agent? Three important distinctions

Conventional ITSM solutions are finding it difficult to cope up with today’s business needs. Complex public, private and hybrid cloud infrastructures add hundreds of thousands of endpoints to the network, and they all must be managed. More is being demanded of IT professionals at the same time that IT talent is hard to find. Organisations are in search of new ways to provide excellent customer service and meet their service level agreements (SLAs).

AI is being touted as the answer for many of...

By Dr. Akhil Sahai, 21 May 2019, 0 comments. Categories: Applications, Employees, Productivity, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

MobileIron aims to kill off the password completely with further move to Zero Trust

Enterprise mobile software provider MobileIron has announced an update to its Access mobile security and identity platform with a zero sign-on solution which aims to finally replace the password as a security authenticator.

The company’s vision is to enable enterprises to use their mobile devices as their digital identity to access enterprise services and data, built on its unified endpoint management (UEM) platform and powered by...

By James Bourne, 08 May 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Privacy, Security.

Why you need to be able to trust your SD-WAN platform

Imagine a scenario when an IT network manager settles into the task of remotely provisioning and configuring an SD-WAN edge router that’s located in a distant branch office. The router appliance was shipped from a supplier’s warehouse to the branch, unboxed, and plugged into power and Ethernet by a local non-technical employee.

Before this new connection to the corporate WAN can be...

By Anand Oswal, 17 April 2019, 0 comments. Categories: Applications, Case Studies, Data & Analytics, Development, Security.

It’s not me, but it is probably you: How IT still views employees with contempt on cybersecurity

A new report from software as a service (SaaS) operations management and security platform BetterCloud begins with a blunt message. “While cybercriminals, hacktivists and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you.”

According to the study, which featured survey data from 500 IT professionals, the ‘well-meaning but...

By James Bourne, 03 April 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Case study: How the National Crime Agency looks to squash the cybercriminals at source

Ben Russell, head of cyber threat response at the National Crime Agency (NCA), wants to get one thing clear. “We’re not a regulator – we’re not here to dish out fines,” he says. “We’re here to support businesses, investigate the criminals and try and catch people in order to help.”

The agency is not here to judge, or enforce anything in particular, but to help businesses if they...

By James Bourne, 03 April 2019, 0 comments. Categories: Case Studies, Data & Analytics, Employees, Privacy, Security.

Verizon finds organisations increasingly sacrificing security to ‘get the job done’

Have you ever been working on a project and, knowing it was a choice between ensuring security and getting to deadline, been forced to go with the latter? If you have, according to a new report, you have plenty of company.

The latest Verizon Mobile Security Index, published earlier this month, found almost half (48%) of the more than 600 survey respondents had sacrificed the security aspect of their work in order to ‘get...

By James Bourne, 28 March 2019, 0 comments. Categories: Data & Analytics, Employee Education, Employees, Enterprise Mobility, Security.