If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews



Opinion


Data security for your mobile workforce

We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

main headline

The fight against mal-adjustment!

How do you stop malicious applications from entering the network? Computing Security asks Mikko Röntynen, director of product marketing at F-Secure, for his thoughts

main headline

Masterclass


The human firewall & ransomware

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions

main headline

Partitioning your responsibilities

Mustafa Fikret Ottekin, Advisor to CEO in ICterra, reflects on the vital roles played by risk analysis and risk mitigation

main headline

News


Announcement: Shearwater Group PLC Conditional agreement to acquire Brookcourt

Over the past 13 years Brookcourt has continuously grown to become a leader in our space

main headline


Inside Track


Always at your disposal

Computer Disposals Ltd (CDL) is one of the UK's leading IT disposal companies, with many of the UK's leading companies amongst its client portfolio

main headline


Thought Leadership


Securing the cloud

Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that’s now facing organisations everywhere

main headline


Exhibitions


A meeting of minds

Infosecurity Europe is Europe's largest and most comprehensive Information Security event, delivering an invaluable business platform. We take you inside

main headline

Features


Full-on visibility

When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout

main headline

Polishing up the chrome

Millions of unencrypted websites may receive security warnings for visitors using Google Chrome browsers, now that Chrome 68 stable updates have gone live

main headline


Product Reviews


Celestix SecureAccess Platform

Remote access to the corporate network is an essential requirement. But it must be easy to deploy AND provide tight security

main headline

My1Login Enterprise

With the General Data Protection Regulation now in force, a robust identity and access management (IAM) solution needs to be firmly in place

main headline


Whitepaper


CFO Phishing / Fraud Attacks - BEC (Business Email Compromise)

BEC (Business Email Compromise) incidents are on the rise, costing companies more than £9.5 billion over the last 5 years

main headline

Welcome to the August 2018 issue of the Computing Security Newsletter.

A cyber risk survey produced by the London Financial Times has found that 58% of cyber-attacks are attributable to employee behaviour, such as human negligence, accidental disclosure and lost or stolen devices. Some observers might feel that employees ‘get it in the neck’ a bit too often, while employers escape the blame. But there are some alarming statistics suggesting the workforce in general does not to sharpen up its act, if it wants to spare its employer from succumbing to the kind of attacks that can cripple them or even put them out of business.

So… the stats. Well, according to an ISACA (an international, independent IT governing body) survey published last year, more than three quarters (76%) of UK office workers didn't know what ransomware was and 36% couldn't define a phishing attack. Let’s hope that this has diminished with the passage of time and the constant campaigns to promote greater awareness, but experience tends to make most of us sceptical ion this regard. Staff need to be aware of the dangers they could potentially impose.

With this in mind, CyberGuard has highlighted key areas where staff can compromise a company:

Weak passwords. Having a weak password is inexcusable and a key area where hackers can obtain crucial business data from your employees' devices.
Phishing emails. How can someone detect if an attachment contains a hidden malicious script or downloads an encryption key from outside your network? There are tell-tale signs on how to spot phishing emails.

Not installing relevant updates. Software updates and patches exist to fix vulnerabilities If staff are continuously clicking 'remind me later' on update alerts, it can seriously put a business' security at risk by prolonging any necessary patches.

Social media plays a huge part in every business life. It's easier to manage and much more engaging platform for brands to communicate with clients and potential customers, However, the same can be said about cyber-attackers.

Connecting to devices using USBs. USBs offer an extremely easy way to install malware onto a business's computer, and many employees connect a USB to their device without even thinking about where it has been. Employers can only do so much when seeking to regulate the behaviour of their staff. The rest is up to them and constant vigilance and behavioural awareness are key to ensuring they help keep the business safe.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here
Privacy Policy

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622