If you cannot view this email please click here.

Management BYOD Infrastructure IoT Storage Cloud
A resilient approach to hybrid working
Security Update | April 2022
Hybrid working presents a number of security challenges for IT teams. Rodolphe Harand at YesWeHack looks at how to address them
Zero Trust Architecture: 5 Reasons You Need It
Security Update | April 2022
Adrian Taylor at A10 Networks explains why a zero trust architecture is the ideal way to mitigate a breach in your network
High Assurance delivers SD-WANs for all
Opinion | April 2022
How High Assurance SD-WAN uses crypto-segmentation to enable organisations in all industries to exploit the benefits of SD-WAN


banner advert
Switching to a new traffic management solution
News | April 2022
Perle IDS Managed Switches provide reliable connectivity in traffic light control systems
West Ham United bolster their defence with Acronis
News | April 2022
Acronis will become West Ham United Football Club's official cyber protection partner
Network attacks are at highest point over last three years
News | April 2022
Watchguard Technologies’ latest quarterly Internet Security Report shows a record number of evasive malware detections



banner advert
Perle IOLAN SCG
Product Review | April 2022
Perle’s IOLAN SCG is the perfect solution for support staff that need always-on remote OOB access to their core network devices



banner advert
The future of cloud native in a brave new world
Opinion | April 2022
How can organisations and their developers creating cloud-native solutions ensure the highest levels of security?
Strengthening the UK’s cybersecurity resilience with Government-imposed credentials
Security Update | April 2022
New laws are being proposed to drive security standards in outsourced IT services used by almost all UK businesses
Reducing downtime with the cloud
Opinion | April 2022
Scott Wilson at eFax explains how to guard your enterprise against cloud outages

AWARDS
Awards | April 2022
The 2021 Network Computing Awards were held on October 21st at the Leonardo Royal London. Here we profile some of this year’s winners:
REMOTE WORKING PRODUCT OF THE YEAR
Awards | April 2022
Winner: OneUp Sales
Runner up: 3CX
DISTRIBUTOR OF THE YEAR
Awards | April 2022
Winner: Brigantia
Runner up: Nuvias
RESELLER OF THE YEAR
Awards | April 2022
Winner: Storm Technologies
Runner up: Contrac

Comment

Are we suffering from a cybersecurity identity crisis? According to the new CyberArk 2022 Identity Security Threat Landscape Report the increase in human and machine identities has driven a buildup of identity-related cybersecurity “debt”, exposing organisations to greater cybersecurity risk. Seventy-nine percent of respondents to CyberArk’s survey agreed that their organisation had prioritised maintaining business operations over ensuring robust cybersecurity in the last 12 months, with the report also finding that machine identities now outweigh human identities by a factor of 45x, with sixty-eight percent of non-humans or bots having access to sensitive data and assets.

Commenting on the report, Udi Mokady, founder, chairman and CEO, CyberArk said “The past few years have seen spending on digital transformation projects skyrocket to meet the demands of changed customer and workforce requirements. The combination of an expanding attack surface, rising numbers of identities, and behind-the-curve investment in cybersecurity - what we call Cybersecurity Debt - is exposing organisations to even greater risk, which is already elevated by ransomware threats and vulnerabilities across the software supply chain. This threat environment requires a security-first approach to protecting identities, one capable of outpacing attacker innovation.”

One of the report’s recommendations to combat this debt is enforcing zero trust principles, and we have an article in this issue from A10 Networks that explores how to build a zero trust architecture to stay one step ahead of network breaches. We also have an opinion piece from VIPRE that sets out how new laws proposed by the UK Government will strengthen the UK’s cyber resilience and what they will mean for managed service providers. And keeping with the theme of cyber resiliance, YesWeHack give us an insight into the security challenges of hybrid working and explain how employees can become the front line of a cybersecurity defence. As Rodolphe Harand at YesWeHack explains “When it comes to cybersecurity, it is ultimately your employees who are first and foremost the strongest line of defence.” We’ll all need to do our part to ensure that our cybersecurity debt doesn’t come due.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Published by: BTC 35 Station Square Petts Wood BR5 1LZ
Tel: +44 (0) 1689 616 000

Privacy Policy. To unsubscribe click here.