
|
Features
|
EOL - Getting it right!
Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how? |
 |
To err is human, but…
Over 95% of all incidents investigated recognise human error as a contributing factor, a new IBM report states |
 |

Opinions |

Product Reviews |
|
Libra ESVA 3.5
Libra scores over the big names in the anti-spam market with its ESVA (email security virtual appliance)
|
 |
Gemalto SafeNet ProtectV 2.0
The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block
|
 |

White papers |
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
COMPUTING SECURITY AWARDS 2014 |
|
COMPUTING SECURITY AWARDS
As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:
|
|
|
|
Welcome to the May 2015 Newsletter.
The close of 2014 brought with it a spate of high profile cyber attacks, in which large companies such as Sony Pictures Entertainment, eBay and Apple all suffered. In fact, in the UK alone 81% of large corporations and 60% of small businesses reported they had a breach in cyber security last year.
Reacting to this worrying trend, the manufacturing industry has very slowly started to invest more time and money in information security. “The cyber threat has been rising steadily in recent years and although investment in information security has seen an increase in the industrial products sector, much more is needed," states Jonathan Wilkins, marketing manager of industrial automation components supplier European Automation.
"There is a common misconception that hackers are responsible for all cyber attacks and therefore businesses that don’t see themselves as attractive targets don't need to invest in information security. In reality, the majority of incidents stem from human error and we'd argue that a large number of these are not down to malicious intent, but rather lack of security knowledge.
"As well as securing and protecting automated systems, a structured corporate policy should be implemented for staff. The policy should include network use in the offices, as well as risk analysis on suppliers and providers," Wilkins adds.
In light of the current cyber climate, European Automation has published an industry report about information security and its growing importance. The report is available for download at: www.euautomation.com/, in the special reports section.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|