If you cannot view this email please click here



Hacking Cloud Compliance Reviews



Thank you to everyone who supported the Computing Security Awards through making nominations, casting votes or through attending last week's Awards ceremony. The awards this year featured some new categories and we saw many new contenders and several new winners. You can see all of the results at www.computingsecurityawards.co.uk


Cybersecurity education finally paying dividends

Palo Alto Networks has released survey results that identify cybersecurity education as finally starting to yield positive results

UK organisations reject multi-factor authentication

Less than a quarter of UK organisations use multi-factor authentication to protect against compromised credentials, a survey has found

main headline

Getting the drop on stolen data

The 2012 Dropbox hack led to the loss of over 68 million usernames and passwords - and the impact of that hack lives on

Businesses still one step behind the perpetrators

The world's biggest companies are facing an unprecedented number and variety of digital attacks by ruthless criminal entrepreneurs

Dell and EMC complete historic merger

Dell Technologies has completed the acquisition of EMC Corporation, claiming this will enable organisations to "build their digital future, transform IT and protect their most important asset, information"p

Majority of IT leaders expect serious data breach

The world's biggest companies are facing an unprecedented number and variety of digital attacks by ruthless criminal entrepreneurs

main headline


Startups in the firing line

Cybercrime attacks went up by 50% in all segments in the 2nd quarter of 2016 – a worrisome trend. And startups are a top target

main headline

Not all is what it SIEMs

How do you justify the cost of investing in Security Information and Event Management (SIEM) to those who control the purse strings within your organisation?

main headline

Three steps to haven

Highly targeted spear phishing attacks can be a nightmare. Yet there are ways around these, says Marc Campbell, Cloudmark

main headline

The Cyber Imposters

An email arrives at work from someone you know well. But is it from that person? Has it been forged?

main headline

Product Review

Varonis DatAdvantage

DatAdvantage from Varonis is built from the ground up as a data access governance solution. Scaling across businesses of all sizes, DatAdvantage offers a wealth of sophisticated tools that take the guesswork out of identifying sensitive data and its ownership

main headline



Computing Security recently interviewed Dr Anand Narasimhan, managing director, Sims Recycling Solutions, EU & India, to garner his thoughts on asset management and disposal

main headline

White papers

How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the October 2016 issue of the Computing Security Newsletter

Fraud is taking off at a ferocious rate. The stats are horrific. It now costs the UK economy £193 billion a year and rarely a day goes by without news hitting the headlines of a company falling victim to a cyberattack. As those with malicious intent continue to hone their skills and increasingly take advantage of the innocent, it is critical that businesses consider how they can stay one step ahead to protect their valuable identity, IP and their customers’ data, warns Nick Brown, managing director at identity data intelligence specialists, GBG.

While businesses are the prime target for these cybercriminals, the real victims of the high-profile data breaches are businesses’ customers themselves, says Brown, who, after putting their faith in an organisation to keep their personal details safe, find out their identities have been compromised. “When a company is hacked, a multitude of sensitive identity data can find its way onto the dark web – where criminals browse, haggle, buy and sell our personal information in an online marketplace. With this in mind, more needs to be done to tackle the escalating problem of online fraud in the wake of these relentless cyber breaches.”

But how? Data transparency can be used incredibly effectively as a way of battling fraud. As Brown points out: “When data is shared freely between the public and private sectors, across geographical and political boundaries and amongst international bodies, a more accurate picture of global fraud patterns can be established. Those with malicious intent are not static individuals – they move around – and unless free-flowing access to real-time information is possible across multiple countries, their criminal history cannot be effectively tracked and they’re free to commit fraud again.”

Identity data intelligence, then, has a huge role to play in uncovering incidences of fraud and even preventing it from occurring in the first place. By using more data, analytical insights and triangulation of multiple identity proofing techniques, when identity theft does happen the effects can be minimised for both the citizen and the businesses who are serving them. “In the battle against fraud, data is good!” Brown concludes. “The more transparent businesses can be with data, the more it can be used to gather insights and intelligence that will stop the bad guys in their tracks.”

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622