Security

Major gaps in enterprise insider threat detection, study shows

Posted on

Major gaps in enterprise insider threat detection, study shows. Two-thirds use perimeter-focused network intrusion detection and prevention tools for this purpose, although the tools are designed to protect from external threats, not internal. 73% of organisations polled are failing to block privileged user access to sensitive data

Security

Do you trust your WiFi – Well don't!

Posted on

“Free WiFi” There is a lot of mobile working going on.  Every coffee shop with free WiFi is seemingly filled with businessmen between appointment’s.  Laptops, tablets & smartphones all hook up semi-automatically to a range of WiFi providers.  It’s a no brainer to work on the move right? WRONG!!!! At the risk of making you […]

Security

What the Adobe hack means

Posted on

40 odd GB of Adobe source code & 2.5M Account holders credit cards have been found on the internet, that’s pretty poor information security. It was discovered by Krebbs a blogger & security expert not announced by Adobe themselves who had known for 4 weeks prior that something had happened. So what could a criminal […]

Legislation

Banking Cyber Security

Posted on

Banks have been asked to bolster their cyber defences by the regulator.This is a Good Thing IMHO However Windows XP, released in 2001 still forms a large part of a banks IT platform (~34%).  From April 8th 2014 windows XP will no longer be supported by Microsoft For example: Dean Stewart, senior director of core […]

Data Breach

Information Security for Financial Advisers

Posted on

Just imagine for one moment that you are a financial adviser (IFA).  Things this year have been tough.  The Retail Distribution Review (RDR) has turned your business model on its head and reduced your industry by 25% in 3 months.  You are having to sit exams and pass them to stay qualified.  You are now […]

Data Breach

Barclays hacking attack gang stole £1.3 million

Posted on

Barclays hacking attack gang stole £1.3 million, police say – Telegraph. A ‘KVM’ is a box about the size of a small paperback book.  It is uncommon to find a WiFi enabled KVM, however server rooms all over the world work on IP addressable KVM’s like these.  In order to to WiFi or more likely 3G […]

Security

High Court 'theft' of confidential information from businesses cases up by 58%

Posted on

http://www.emwllp.com/news/confidential-information-theft-cases-reach-record-high/ The Telegraph puts the average cost at £30,000 but having been through the process of a Data Theft prosecution we didn’t get much change out of £1M so the range is large The exacting nature of the evidence required in the legal proceedings convinced us at the time that our Log Aggregation and System Monitoring software […]