Employees who see compliance violations twice as likely to leave, says Gartner

Employees who see misconduct or a compliance violation at work are twice as likely to leave their organisations, according to a new study from Gartner.

The survey, which sampled more than 5,000 employees at various levels, found that 29% of employees saw at least one compliance breach at work in 2016 and 2017. Of these sampled employees, 59% were actively looking for another job due to a compliance violation. This was compared with...

By James Bourne, 13 August 2018, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

How to combat daily security threats within the healthcare sector

Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on May 12, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents.

According to the NAO’s published report earlier this...

By Anthony Perridge, 07 August 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, IoT, Security.

The risk of ransomware: How to avoid becoming a victim

Since it made more frequent waves in the headlines in waves in 2017, ransomware – which allows hackers to commandeer a company’s data and hold it under password protection until a ransom is paid – has become one of the most feared and profitable weapons in a cybercriminal’s arsenal. More and more hackers are turning to ransomware because it delivers them the best bang for their buck. Small and medium-sized businesses (SMBs) are particularly vulnerable to this...

By Mark Banfield, 02 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Check Point upgrades mobile security solution ‘SandBlast Mobile 3.0’

SandBlast Mobile 3, one of the leading mobile threat defence solutions owned by Israeli firm Check Point, has been enhanced with some on-device technology that prevents malicious malware, botnets, and phishing attacks on all mobile applications.

The solution has established a benchmark in terms of new mobile security with on-device network threat prevention.

SandBlast Mobile has been upgraded with important features that now prevent phishing attacks on applications, keeps away from browsing to malicious...

By Enterprise CIO, 27 July 2018, 0 comments. Categories: Security.

CIOs want cloud, cybersecurity and AI – but not all confident their IT is up to it

Data analytics, cloud and cyber security are the key technologies for CIOs today – but a fair proportion are looking at artificial intelligence (AI) and machine learning.

That is the primary finding from a study by Trace3, a provider of, well, cloud, cybersecurity, and machine learning software. Never mind that however – the statistics from the study, which featured more than 200 responses from the C-suite, as well as vice presidents and directors, are still...

By James Bourne, 25 July 2018, 0 comments. Categories: CIO, Cloud , Data & Analytics, Security.

Industries still ‘in the middle’ when it comes to cybersecurity implementation, Gartner finds

Even though 95% of CIOs expect cyber threats to increase over the next three years, only two in three (65%) organisations currently have a cybersecurity expert.

That’s the key finding from analyst firm Gartner, who polled 3,160 CIO respondents across all major industries that represent approximately $13 trillion in revenue and public sector budgets and $277 billion in IT spending.

The survey also found that skills challenges continue to plague organisations that adopt digitalisation, with digital...

By Enterprise CIO, 23 July 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Facebook Messenger and WhatsApp Messenger top blacklisted enterprise app list again

Facebook Messenger and WhatsApp Messenger have got plenty of fans – but not so much in the enterprise as they continue to be blacklisted.

That’s the key finding from the latest quarterly report from enterprise mobile security provider Appthority. The study, the Enterprise Mobile Security Pulse Report for Q218, is based around the millions of scans the company performs for its customers, and found WhatsApp and Facebook to be similarly popular – and unpopular from a security view – for...

By James Bourne, 19 July 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.

What can the enterprise learn from the connected home?

From refrigerators and lamps to door locks and heating, the Internet of Things (IoT) has revolutionised the way we live and work, making a truly robust ecosystem of smart devices a reality.

Indeed, IoT has quickly become one of the hottest technology topics around, expanding into all manner of industries as the rate of innovation shows no signs of slowing down.

Within the home, IoT has turned everyday objects into connected products designed to make our lives easier, more convenient, and more comfortable. The...

By Leigh Moody, 18 July 2018, 0 comments. Categories: Employees, Enterprise Mobility, IoT, Security.

McAfee revamps with new enterprise security portfolio

Guess who’s back? Well, to a certain extent at least. McAfee has announced the launch of a new enterprise security portfolio which aims to give customers a ‘comprehensive, flexible defence system that manages their security products based on their needs today and in the future as they continue to move to modern device operating systems and to the cloud.’

The product, McAfee MVISION, offers a single integrated management workspace, and three subsidiary products – McAfee MVISION ePO...

By James Bourne, 18 July 2018, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

Get communication right between the CISO and the board to improve enterprise security

If security is a hot button issue in your organisation – and of course, why wouldn’t it be? – then CISOs and the rest of the board need to more ably see eye to eye, according to a new report.

The report, from Kudelski Security’s Client Advisory Council (CAC), argues it is a two-way street. The board needs to see CISOs as equal partners in the C-suite, rather than ‘compliance chasers and one-way cost centres’, while CISOs need to see cybersecurity from a board point of view...

By James Bourne, 11 July 2018, 0 comments. Categories: CIO, Enterprise Mobility, Security.

Phishing awareness training not translating to fewer clicks, research argues

The emails just keep on coming; many relevant, but many more either just good old fashioned spam or, worse, phishing attempts. Yet new research argues that despite regular phishing awareness training, many companies are still falling for the old routines.

The research was conducted by Ironscales, an Israel-based company which claims to offer the world’s first automated phishing prevention, detection, and response platform. More on that later – but according to the data, which came from 300...

By James Bourne, 10 July 2018, 0 comments. Categories: Employee Education, Employees, Security.

Don't compromise security when exploring blockchain initiatives, organisations warned

If you mention the word blockchain at an event or networking soiree, there will naturally be a frenzy of activity; how is your business going to be transformed by it? How much are you betting on it? But is this rush to take advantage of the newest, shiniest object neglecting security?

According to new figures from RSA, traditional security information and event management (SIEM) tools aren't going to cut it with identifying 'new normal' behaviours associated with...

By James Bourne, 05 July 2018, 0 comments. Categories: CIO, Employees, Security.

How analytics are empowering next-gen access and zero trust security

Employee identities are the new security perimeter of any business.

80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe. And with Gartner predicting worldwide security...

By Louis Columbus, 03 July 2018, 0 comments. Categories: Employee Education, Employees, Security.

BlackBerry and Samsung continue collaboration to help businesses with digital transformation

BlackBerry and Samsung are rekindling their long-standing partnership and are setting out a ‘multi-year strategic relationship’ to help businesses accelerate digital transformation and ‘Enterprise of Things’ initiatives.

The key facet of the move will see joint enterprise customers being able to manage their wide collection of Samsung devices – be they phones, tablets, or wearables – out of the box through BlackBerry’s UEM (universal endpoint management) platform...

By James Bourne, 02 July 2018, 0 comments. Categories: BlackBerry, Employees, Enterprise Mobility, IoT, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

New research sounds warning over balancing employee productivity and security

There always needs to be a fine line between ensuring productivity within employees and keeping them happy. Take the story earlier this month regarding an employee in Japan who was publicly admonished for ‘habitually’ leaving his desk a few minutes early for lunch.

Yet new figures from Spiceworks have found that employees spend up to 26 days per year on websites unrelated to their job.

According...

By James Bourne, 25 June 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

How to counter the increasing volume of DDoS attacks

As attacks are getting more sophisticated, so must our defences.

The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.

Such a service meant that criminals could flood servers with traffic for as little as...

By Ronald Sens, 25 June 2018, 0 comments. Categories: CIO, Data Loss, Employees, Enterprise Mobility, Security.

Automation, orchestration and response: Evolution of incident management

The cybersecurity world is constantly growing. It never stands still, there is always some kind of threat, hack or vulnerability happening, making it nigh on impossible to keep track. Cybersecurity is like a high-stakes game where the bad guys get endless ‘lives’ during an attack and yet a single mistake from the good guys can cause a breach.

Nowadays, everybody uses SIEM (Security Information and Event Management) technology to consolidate alerts from their detection products into a single list...

By Vinaya Sheshadri, 20 June 2018, 0 comments. Categories: Identity, Security.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

Enterprise mobility and security: How to build a BYOD policy

As far back as 2012, Microsoft figures found that more than two thirds (67%) of workers already use their personal devices for work purposes – and that 87% of companies rely on their employee using personal devices to access business apps.

This, of course, is BYOD (bring your own device), and it’s more popular than ever before. Today’s mobile workforce benefits from easier collaboration, better tools and increased popularity – which is why remote teams and enterprise mobility are so...

By Tim Isaac, 01 June 2018, 0 comments. Categories: BYOD, Enterprise Mobility, Security.