If you cannot view this email please click here

BYOD

Passwords

Hacking CloudSecurity Compliance Reviews

Features


Malware and Malpractices

Despite the potential threats, as many as 25% of all PCs remain unprotected. Why is there such a poor attitude to security in some quarters? Computing Security finds out

main headline

Sizing up the Most Vulnerable

Smaller businesses are now just as much at risk as larger companies, as they are less likely to be aware of the dangers and the vulnerable position in which they find themselves.

main headline

NATO Comes Under Bombardment

NATO was the victim of a massive number of cyber attacks last year, with many in the 'serious' category. How long can the cyber terrorists be held at bay?

main headline

Joining the Gold Rush

The race is truly on to use apps to gain a competitive advantage. At the same time, applying secure, robust testing must not be sacrificed in the process.

main headline
banner advert

News

Do you know who has got their eye on you?

It has been revealed that internet users may be at risk from hacked webcams, with hackers able to control and switch on these devices without the owner's knowledge or permission.

main headline

Tigerspike issues $10,000 Karacell hacking challenge

As mobile security, processing speed and battery life continue to threaten usage, Tigerspike has created Karacell, a quantum-resistant encryption technology set to transform how organisations and individuals can keep their mobile data safe on personal technology devices.

Ubisoft's Uplay service hacked

Joining a slew of recent data breaches at the server level, gaming publishing giant Ubisoft has issued a statement admitting that an attack on its network had resulted in details of its customers being accessed by a rogue third party.

main headline

Business secrets being sold on an 'Industrial Scale'

In a recent news story on cyber espionage, GCHQ director Sir Ian Lobban stated that business secrets were being sold on an 'industrial scale'.

main headline

Policing your BYOD Policy

A new survey by Acronis of more than 4,000 IT professionals around the world has revealed that 75% of organisations don't have a policy in place around the use of public clouds for company files.

US scores highest for spam email messages

AppRiver has released its mid-year Global Threatscape Report, a detailed analysis of web and email-borne threats and malware trends traced between January and June 2013.

Opinion

World of Constant Threat

To ensure a sandbox is providing you with complete and guaranteed protection, you need to build in a 'Default Deny' strategy, argues Comodo

main headline

Review

AhnLab Malware Defense System

Having dealt efficiently and impressively with numerous sophisticated attacks believed to originate from Asia and Russia, AhnLab has now turned it gaze on the European market

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Welcome to the October edition of the Computing Security Newsletter.

No matter how high the defences we stack up against them, the more the cybercriminals come back to carry out another frenzied assault. And the reason isn't hard to see: there are lots of easy victims out there to target, most of whom have a scant appreciation of what good security really is. Oh, and another thing - this type of crime really does pay!

Hopefully, the recent creation of the new Cyber Crime Reduction Partnership will prove up to the task of helping to tackle the growing threat that comes from organised and global cybercriminals and to promote safer practice. But there is no point in sitting back, in the expectation that they will clean up the streets and make us all so much safer. Cybercrime is too profitable for that and there are easy pickings out there, as long as organisations fail to take the threats seriously - ie, acknowledging that it could happen to them, too!

So, how do businesses fight back? By having the most secure, resilient and well constructed policies, processes and procedures throughout their organisations. And that does mean 'throughout'. Leave but one person out of the fold when spreading the corporate message and you might as well not have bothered in the first place. Nor does that simply mean the people inside your organisation. It means everyone who has any connection into your business in any way, shape or form. Get that right and you have a fighting chance of keeping your organisation safe. But then you have to get it right the next day as well... and the day after that, ad infinitum.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622