If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

banner advert

Features


EOL - Getting it right!

Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how?

main headline

Plan...Prepare...Protect!

By 2018, 40% of large organisations will be ready to address cyber-security business disruption attacks

main headline

Everything connected - and safe

The Internet of Everything brings together people, process, data and 'things' in a powerful new way. But it also brings a great deal of risk

main headline

The solace of quantum

Quantum Key Distribution technology - the next frontier of data encryption technology - signals a brave new future

main headline
banner advert

Opinions

Navigating standards in the ITAD industry

Dr Anand Narasimhan, Director UK, EU & IN, Sims Recycling Solutions, explains why Standards really matter and what to look for

main headline

Top 3 data security threats

Roman Foeckl, CEO and founder of CoSoSys, on how to mitigate threats through a sound data security plan

News

Worrying lack of mobile app security

IBM Security and the Ponemon Institute have released new research unveiling the alarming state of mobile security

main headline

Breached in just 82 seconds

That's how long it takes from the start of a phishing campaign circulating to when it receives its first bite

ATD foresight from ForeScout

A new means of containing advanced persistent threats (APTs) has been unveiled

Symantec Names New Executive Leadership Team

As it separates into two companies, Symantec has reached a key milestone.

main headline
banner advert

Product Reviews

Acunetix Online Vulnerability Scanner

SMBs need to protect their web sites, but few have the financial resources to ensure they are totally secure. Acunetix comes to their rescue!

main headline

Libra ESVA 3.5

Libra scores over the big names in the anti-spam market with its ESVA (email security virtual appliance)

main headline

Gemalto SafeNet ProtectV 2.0

The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

main headline
banner advert

White papers

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

COMPUTING SECURITY AWARDS

COMPUTING SECURITY AWARDS

As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:

New Product of the Year - Security 2014

WINNER: Wallix - WAB On Demand

main headline

Personal Contribution to IT Security Award 2014

WINNER: Ian Whiting - Titania

main headline

Security Company of the Year 2014

WINNER: Celestix

main headline

Welcome to the June 2015 Newsletter.
Here's a sobering point to reflect on. Check Point has monitored and analysed hundreds of millions of security events from over 17,000 organisations worldwide across a range of industry sectors, using in-depth security audits and its own global network of threat sensors, and the results are not heartening.

Its 2015 Security Report shows the following outcomes on an average day in an average enterprise business:

• Every 34 seconds, unknown malware is downloaded to company networks (48x more than 2014's report)
• Every 60 seconds, a bot infection on a network communicates with its command centre (3x more than for 2014)
• Every 6 minutes, a known malware type is downloaded to company networks (nearly twice as much)
• Every 30 minutes, a DDoS attack is launched against an organisation (6x more)
• Every 36 minutes sensitive data are sent outside the organisation (37% more).

Just as concerning was Symantec's latest Internet Security Threat Report (ISTR), Volume 20, which exposed a tactical shift by cyberattackers: they are now infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them.

"Attackers don't need to break down the door to a company’s network when the keys are readily available," says Kevin Haley, director, Symantec Security Response. "We're seeing attackers trick companies into infecting themselves by Trojanising software updates to common programs and patiently waiting for their targets to download them-giving attackers unfettered access to the corporate network."


To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622