If you cannot view this email please click here



Hacking Cloud Compliance Reviews

Industry Focus

Promoting IT sustainability through risk management

E-waste is the largest-growing waste stream. By changing our 'use and discard' approach, this is an area where we can make a significant impact, says Steve Mellings, CEO and founder of ADISA

main headline

Expert Insight

Raising the Standard

Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments

main headline


Bigger phish - and true champions!

Fake news is rife, such as communications of late falsely stating that they were issued by, or in association with, the UN and/or its officials. Can we ever trust any information disseminated in this way?

main headline

Security Update

Professionalisation of the Darknet

Movement away from the Darknet, as actors scatter in all directions, is making it ever harder to keep tabs on who is selling what, where and to whom, says Mark Pearce, chief marketing officer, CYJAX

main headline


A failure to protect

Facebook has suffered several serious data leaks that have left customer data worryingly exposed. Past promises to reform its processes and protect these precious assets seem hollow

main headline

Expert Opinion

Eliminating wastage

A thorough risk assessment is essential when deciding where security efforts need to be concentrated, says Eoin Keary, CEO and founder of edgescan

main headline


Jumping on the Bandwagon

The latest data breach from Facebook is not all that it seems, states Dr Debbie Garside, Group Chief Innovation Scientist/CEO of GeoLang, A Shearwater Group plc Company

main headline

Research Findings

Caught in an endless struggle

Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively

main headline

Special Focus

The dark shadow that hangs over everyone

Cryptojacking and shadow mining are terms most of us have heard. But how do they differ and what threats does each pose?

main headline

Industry Focus

The ITAD rebate scam

Jean-pierre Naylor, director, CDL, takes a look at practices relating to redundant IT equipment - PRACTICES he feels give the industry a bad name

main headline

Computing Security Awards: A Real Winner!

The 2019 Computing Security Awards at the Leonardo Royal Hotel, London City by Tower Bridge in London were a huge success. We expect the 2020 awards to be even bigger and better, judging by the number of top companies already looking to compete and carry off one of our prestigious awards. As the build-up starts to gather pace, take a look at all the winners from last year’s awards at: https://www.computingsecurityawards.co.uk

Product Review

Libraesva Email Archiver

Libraesva has a strong pedigree in the email security market and our independent review says that its latest Email Archiver comes up trumps

main headline

SecurEnvoy SecureIdentity DLP

SecurEnvoy, a pioneer in the field of multi-factor authentication (MFA), has turned this expertise to identity, access and data security management - to great effect

main headline


Deployed as a SaaS (software as a Service) solution, edgescan delivers an innovative 'bionic' defence that powerfully combines machine automation with human intelligence

main headline


Finally, we have recently created a LinkedIn page for Computing Security magazine, so you can access regular news updates, articles, case studies, product reviews and much more. Follow us at: www.linkedin.com/company/34714286

Welcome to the January 2020 issue of the Computing Security Newsletter.

Foreign currency seller Travelex was forced recently to take down its website, following a cyber-attack. Although the company said shortly afterwards that an early investigation had been conducted, suggesting there was " no indication that any personal or customer data has been compromised", Travelex resorted to carrying out transactions manually.

Susan Hall, a specialist in information and communications technology, says the company’s response to the attack has been spot on and that other businesses should take note. "Businesses, particularly ones in the financial services sector, have to be prepared to be the focus of a cyber-attack and this is an example, working through in real time, of what seems to be a disaster recovery plan swinging into operation," states Hall, a partner in the intellectual property team at national law firm Clarke Willmott LLP.

"There is a manual alternative to keep services running, clear communication to the public and reassurance about data security. It's particularly admirable, since it’s multinational and occurring at a time where there are likely to be a lot of people off on holiday."

Hall offers a five-point plan for businesses to protect themselves in similar circumstances:
• First step is to develop a good disaster recovery plan for your business. This plan should be constantly refined and updated and, most importantly, it should be tested to check it is fit for purpose

• Response team should be on call 24/7 - cyber criminals don't sleep, so your team can't either!

• Causation, Correction and Communication: analyse what went wrong, correct what went wrong and communicate what you're doing

• Lead from the top: make sure that communications come from a senior source who acts as the company spokesman. It is therefore important to ensure that whoever is on the frontline is appropriately media trained, and confident in dealing with press and public enquiries

• Don't skimp on resources - throw everything at it that's needed.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here See our Privacy Policy here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622