The root cause of most digital security breaches is unpatched software with known vulnerabilities.
A vulnerability is like a back door in which hackers and cyber-criminals can access your systems. Once inside, your data is in their hands.
The WannaCry ransomware attack, is a recent example of a known vulnerability being exploited to great effect. This attack locked affected users out of their information, demanding payment to return access to their files. As with most ransomware attacks, paying the ransom is not a guarantee the files will be unlocked. Read more
The cloud has opened up incredible opportunities and efficiencies for businesses. However, with these opportunities there is also an increase in security risks. How can you be sure your data is safe in the cloud?
Traditional ways of protecting data, such as passwords, firewalls, and other defensive strategies are no longer enough. For greater protection, encryption protects your data from being accessed by anyone without the corresponding key. Data that is encrypted with a key, can only be deciphered by the same key. Read more
Managed cloud services remove the need for organisations to perform many specialist functions in-house, providing access to essential digital services in a way that is cost-effective and convenient.
The downside is these services can leave a company’s data vulnerable to theft, tampering, or even seizure by government authorities and law enforcement agencies. As a data owner, you could then be subject to large fines, negative publicity and possible business collapse.
Encryption is the only way to protect your data. Data that has been encrypted is unreadable to those who are not authorised to access it. It also allows monitoring and reporting on who, or what, is accessing the data and when. Read more
Over 600GB of unsecured customer data was discovered on an Amazon cloud database last month. The records belonged to approximately 4 million US Time Warner Cable (TWC) customers. The data, which had been set to allow public access, rather than limit access to administrators or authorised users, was discovered accidentally by a digital security company while investigating an unrelated breach.
According to a report published after the discovery, Broadsoft Inc, a third-party communications company engaged by TWC, are to blame for the breach. Read more
In the UK there are laws to protect consumers from unfair contract terms. However, commercial parties have less protection and are generally free to bind themselves to whatever terms without fear of court intervention.
As businesses outsource an increasing number of activities, it is important to fully understand what you are committing to when you sign a contract with a third party.
This is especially true for automatically renewable contracts. For some, they are convenient, ensuring services continue uninterrupted. For instance, if you forget to renew your web hosting and haven’t agreed to automatically renew or made other provisions, your website will likely go down when the contract expires. This could have a detrimental effect on your business. Read more
Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR?
The majority of conversations surrounding its imminent arrival strike a tone similar to the way citizens were prepared for nuclear Armageddon during the Cold War. With so much attention focused on potential doomsday scenarios, are we ignoring the positive aspects?
Reducing the cost of storing data
Before the digital era, organisations had a finite capacity for data storage. When the filing cabinet looked fit to burst, it was time to purge the documents that were no longer relevant or useful. As businesses transitioned from hard copies to digital copies, that element of housekeeping was often left behind, perhaps proving there’s truth to the saying, out of sight, out of mind. Read more
Nation state sponsored cyber-attacks are growing in frequency, reach, and sophistication.
Within the previous year alone, a successful attack targeted the World Anti-Doping Agency, releasing the medical records of Olympic athletes from around the world. State sponsored hacking is also assumed to have played a role in the outcome of the US 2016 election, leading the US government to release a report detailing indicators of Russian involvement.
While countries have been conducting stealth attacks against each other for centuries, the digital era means these attacks can now be achieved remotely with technology. Read more
Outsourcing tasks and responsibilities is commonplace for many businesses today. Everything from administration and HR, to bookkeeping and IT can be outsourced to a third party, allowing you to focus fully on the core competencies of your business.
While this usually brings about benefits in terms of efficiency and cost, it can also cause serious problems and risks if the issue of data access is not properly considered. Read more