If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews


Computing Security Awards


The build-up to the 2019 Computing Security Awards is now well and truly underway. Those who won last year will be seeking to repeat their success, while those who were contenders will be looking to go one step further next time and carry off the laurels.

Vendors: just a reminder that all those solutions that have been independently reviewed for Computing Security in the year leading up the Awards will be shortlisted for the Editor’s Choice. If you have a solution that you would like to be reviewed, please contact the Computing Security team on 01689 616000.

Here are some more of the winners from 2018:

Editor's Choice

WINNER: My1Login - Enterprise IAM
My1Login is regarded in many quarters as the UK's most secure, most widely compatible, award-winning enterprise Identity & Access Management solution that enables organisations to mitigate password-related cyber-security risks, control user identities and help meet critical compliance obligations, such as GDPR. For more information, go to: www.my1login.com




main headline

The Contribution to CyberSecurity Award

WINNER: Rodney Joffe, Neustar
RUNNER-UP: David Emm, KasperskyLab
Comment from Neustar: We are extremely grateful to all Neustar customers and peers who voted for Rodney Joffe to win this award. Although Rodney has been on the receiving end of various awards, he is absolutely thrilled and humbled to have achieved his first Computing Security Award, recognising a lifetime of dedication to cybersecurity

main headline


Strategy in Action

Think like an Attacker: A strategic, risk-based approach to cyber security

Occurrences of data theft, corporate reputational damage, cybercrime, state sponsored actors and hacktivists would fill several volumes - with room to spare. A strategic approach to cyber security has never been more necessary or urgent

main headline



Inside Track


Why 'proper' disposal is more important now than ever

With the introduction of the GDPR regulation in May 2018, organisations responsible for IT disposal had no option but to review their disposal process for WEEE and, in particular, data-bearing assets, as Jean-Pierre Naylor, managing director and owner, Computer Disposals Ltd (CDL), explains

main headline



Industry View


Rapid7 swoops in

Rapid7 has acquired NetFort, which provides end-to-end network traffic visibility and analytics across cloud, virtual and physical networks

main headline


Opinion


Clever thinking

Gaining insight into every incoming threat is invaluable to a company's security posture and can be gathered through a combination of smart security strategies, as Javvad Malik, security advocate for AT&T Cybersecurity (formerly AlienVault), explains

main headline

Exhibitions


It's showtime again!

Infosecurity Europe is Europe's largest information security event. So, make sure you are there to see all the latest technology and solutions that can help to drive your business forward - and keep it that much safer

main headline

Product Review


CYJAX Intelligence Platform

The CYJAX Intelligence Platform offers an innovative approach to cybersecurity by presenting enterprises with a wealth of cyber threat intelligence

main headline

Welcome to the May 2019 issue of the Computing Security Newsletter.

Due to the vast amount of sensitive data they hold, educational institutions are a key target for cyberattacks. According to a recent report, ethical hackers were able to overcome UK university defences and obtain 'high-value' data within two hours. In fact, universities and research centres have faced repeated attacks from bad actors, with more than 200 institutions reporting more than 1,000 attempts to steal data or disrupt services last year.

As the holiday season approaches, many people tend to travel, and last-minute emails or reports may tempt students and faculties onto shared networks. But with valuable assets and data on public Wi-Fi access comes great security risk and vulnerability.

I note that SecureAuth recommends a number of ways for educational bodies to reduce risk and defend against attacks, advising that they:

Employ secure access control. Username and password combinations are notorious for offering suboptimal security and educational organisations need an approach that protects the end user and sensitive information, while not hindering user experience. “Adaptive authentication is one approach that provides world-class security without impacting usability,” it suggests

Deploy single sign-on authentication. The number of passwords students and staff must manage grows daily, putting security at risk. “However, by adopting a passwordless approach with single sign-on, the user is given a single set of credentials to remember, streamlining secure access to on-premises, mobile, cloud, VPN, and legacy resources, while eliminating stored, passed, or synced credentials.”

Be wary of public Wi-Fi. Public Wi-Fi is not monitored, nor is it secure. “Cybercriminals can see individuals' activity, such as sites logged into, data being transferred and other information of what the user is doing. While away from the campus, staff and students should avoid visiting sites or conducting activity with sensitive or confidential information, such as money transfers, when connected to a public hotspot. Instead, they should wait until access can be achieved on a trusted network.”

As sound advice, of course. As ever, the challenge is most often getting those targeted to follow this!

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here See our Privacy Policy here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622