If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

banner advert

Features


EOL - Getting it right!

Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how?

main headline

To err is human, but…

Over 95% of all incidents investigated recognise human error as a contributing factor, a new IBM report states

main headline

Europe's No.1 Information Security Conference and Exhibition

'Intelligent Security: Protect. Detect. Respond. Recover.' is the theme of Infosecurity Europe 2015, held 2-4 June in London

banner advert

Opinions

Navigating standards in the ITAD industry

Dr Anand Narasimhan, Director UK, EU & IN, Sims Recycling Solutions, explains why Standards really matter and what to look for

main headline

Top 3 data security threats

Roman Foeckl, CEO and founder of CoSoSys, on how to mitigate threats through a sound data security plan

News

85,000 new malicious IPs a day

The new Webroot 2015 Threat Brief reveals that 85,000 new malicious IPs are launched every day

main headline

Senior management must tackle insider threat

Not take enough responsibility is being taken at the top for internal security, claims new research

Staying ahead of threats

A new move aims to broaden the reach of cyber threat intelligence sharing

Lack of confidence in data security measures

New research has revealed a crisis of confidence about the adequacy of data security measures

Symantec Names New Executive Leadership Team

Since announcing its plan to separate into two publicly traded companies, Symantec has now reached a key milestone

main headline

ISO/IEC 27001 Audit an endorsement for Sims

The annual re-assessment audit for ISO/IEC Standard 27001:2005 has proved a boon and sweeping endorsement for Sims Recycling Solutions

main headline
banner advert

Product Reviews

Acunetix Online Vulnerability Scanner

SMBs need to protect their web sites, but few have the financial resources to ensure they are totally secure. Acunetix comes to their rescue!

main headline

Libra ESVA 3.5

Libra scores over the big names in the anti-spam market with its ESVA (email security virtual appliance)

main headline

Gemalto SafeNet ProtectV 2.0

The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

main headline
banner advert

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The IT Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.>

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

COMPUTING SECURITY AWARDS 2014

COMPUTING SECURITY AWARDS

As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:

Editor’s Choice – Security 2014

WINNER: Cyberoam – CR35iNG

main headline

Security Distributor of the Year 2014

WINNER: Wick Hill

main headline

Security Reseller of the Year 2014

WINNER: Brookcourt Solutions

main headline

Welcome to the May 2015 Newsletter.

The close of 2014 brought with it a spate of high profile cyber attacks, in which large companies such as Sony Pictures Entertainment, eBay and Apple all suffered. In fact, in the UK alone 81% of large corporations and 60% of small businesses reported they had a breach in cyber security last year.

Reacting to this worrying trend, the manufacturing industry has very slowly started to invest more time and money in information security. “The cyber threat has been rising steadily in recent years and although investment in information security has seen an increase in the industrial products sector, much more is needed," states Jonathan Wilkins, marketing manager of industrial automation components supplier European Automation.

"There is a common misconception that hackers are responsible for all cyber attacks and therefore businesses that don’t see themselves as attractive targets don't need to invest in information security. In reality, the majority of incidents stem from human error and we'd argue that a large number of these are not down to malicious intent, but rather lack of security knowledge.

"As well as securing and protecting automated systems, a structured corporate policy should be implemented for staff. The policy should include network use in the offices, as well as risk analysis on suppliers and providers," Wilkins adds.

In light of the current cyber climate, European Automation has published an industry report about information security and its growing importance. The report is available for download at: www.euautomation.com/, in the special reports section.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622