If you cannot view this email please click here

Advertisement

BYOD

Passwords

Hacking Cloud Compliance Reviews


COMPUTING SECURITY AWARDS



At a gala event in October, the top talent captured the honours in the 2017 Computing Security Awards. The full list of our 2017 awards winners can be seen by going to: www.computingsecurityawards.co.uk



Features


The rise and rise of ransomware

Javvad Malik of AlienVault, on how the digital revolution has made Ransomware such an ominous presence

main headline

Securing email is essential

Colin Tankard, managing director, Digital Pathways, offers his insights on keeping such a vital communications tool as email safe

main headline

Health Check: a varied prognosis

While many businesses recognise the need for tight cyber security, there remain areas of real neglect, a government report states



main headline

Outside in

Do managed security services providers really have superior expertise and deliver this to a business at a fraction of the cost of in-house security resources? Or is it more a matter of ‘horses for courses’?

main headline

You don't have to be a victim

Computing Security investigates how businesses can keep themselves safe from targeted attacks. One suggested approach is to assume that the attackers will gain access and, from there, think exactly like the hackers do

main headline

CYJAX Achieves ISO 27001 Certification

CYJAX, the award-winning cyber threat intelligence company, has become what is said to be the first organisation of its type in the world to achieve ISO 27001 certification



Reviews


Red Sift OnDMARC

Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.

main headline

Malwarebytes Endpoint Protection

Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.

main headline


Welcome to the December 2017 issue of the Computing Security Newsletter.

At a time of growing anxiety about the level of breaches that are occurring – with high profile after high profile organisation revealed to have suffered a serious breach – it’s little wonder that in Frost & Sullivan’s recent survey covering end-user perspectives on navigating digital transformation some 54% of IT professionals cited cybercrime and espionage as their top challenges.

Following hard on their heels were followed by systems integration, with other noteworthy findings including significant IT investment in productivity, improving digital presence, as well as communications/collaboration tool integration with other business software (Microsoft Office, Google-G-suite, CRM, ERP) and vertical applications.

Frost & Sullivan’s research survey, ‘An End-User Perspective on Navigating Digital Transformation, Europe, 2017’, finds that the top benefits seen by organisations deploying Internet of Things technologies include boosting customer service and marketing and automating manual processes.

The survey aimed to understand the IT-related challenges facing organisations; monitor the status of digital transformation, including newer solutions such as AI, AR/VR, and mCommerce; assess current and future uses of business communication technologies; evaluate drivers behind investments in communication technology; appraise IT budgets; and gauge IT and communication trends.

What is clear is that security has to be part of the whole package. Aspiring to excel in any or all of the other areas is to little avail, if the business is brought to its knees by a cyber-criminals, for example. Only a comprehensive strategy that embraces the business in its entirety will keep organisations safe and allow it to thrive.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622