Home / Archives For Security

Security

Physical vs Virtual Security

Many people will use their computer for most of their business needs, including correspondence, invoicing, accounting, documentation and research, instead of looking to physical tools as simple as a pen and paper or a book. Similarly, there are hordes of people out there who, in this technological age, will prefer to do any form of every day communication behind the safety of a computer screen. Ordering a take-away, booking a table in a restaurant, planning a trip or even organising a meeting – all of these tasks can easily be completed by using technology. So with this dependence on technology in mind, why do we still continue to put the our virtual security at the bottom of our list of priorities, instead ensuring that physical tools have the best possible insurance and yet leaving...

2014-2015 Security Surprises, Challenges And Predictions

As 2014 comes to a close, it is time to cast my 2015 security predictions and look back at my 2014 predictions to see what I got right, wrong, and what surprised me. Hindsight Is 20/20: A 2014 Retrospective I made three predictions late in 2013 about the evolution of security defences for 2014. The first was that incident response would finally mature to the level of other first-class business processes. The second was an increase in the implementation and adoption of two-factor authentication, and the third and final prediction was the use of Software Defined Networking (SDN) to defend against the most advanced attacks. I think two of the three predictions were correct, with the SDN prediction being somewhat accurate but not culminating in the full adoption that I had anticipated. Out of ...

5 Reasons To Secure Your Business Using CCTV

Whether you run a local corner shop or work from an office complex employing hundreds of staff, security is of paramount importance. Thankfully, due to the advancements in technology in recent years, ensuring the commercial security of your business is more sophisticated and accessible than ever. Here are some things that you can do to improve the security of your business using technology. Hopefully they will help to rid your mind of any doubts of the importance of security, particularly CCTV, on your premises. 1. CCTV Cameras Are The Perfect Deterrent The sight of a CCTV camera or even a blinding yellow sticker alerting people to the fact that cameras are operational is enough to scare off most burglars who want to break in. If someone intends on committing a crime, they obviously don’t ...

A New Approach Is Needed To Combat Evolving Cyber Threats

The more organisations become digitised, the more opportunities open up for unscrupulous individuals to infiltrate critical data. Employees’ adoption of consumer technology at work regularly outstrips the IT department’s ability to protect against security issues these devices introduce. Organisations had no sooner decided how to handle the introduction of smartphones and tablets before they then had figure out how to deal with new wearable devices like Google Glass and Apple Watch. Along with the proliferation of data, devices and connections, malware is becoming increasingly sophisticated. Advanced Persistent Threats (APTs) – a network attack in which an unauthorised person gains access to a network and stays there undetected for a long period of time – are one of the most vi...

Securing Your Business In An Increasingly Complex IT Landscape

Security risks to business systems are increasing at a rapid rate and going undetected by even the best IT teams. As technology grows, businesses are now battling to contain the impact of external threats from employee-owned devices, mobile workers, unauthorised software applications and cloud services. Gartner estimates that by 2017, marketing will spend more on technology than the IT department. Yet it’s the hard-pressed IT professionals that will still need to protect everything, and keep employees and company data safe from data breaches and cyber attacks. For IT teams struggling to secure IT landscapes, Managed Firewalls provide the answer. A managed firewall service offers an advanced security device using Unified Threat Management technology, which can inspect all traffic entering a...

When Hackers Attack Your Web Cameras: How To Beat The Cyber Woes

The modern home abounds with smart devices invented to improve our day-to-day living; one of which is the IP (Internet Protocol) home security camera. With this, you can keep a watchful eye over your home, office, pet or children by remotely viewing a live internet video stream. Affordable, accessible, and convenient, over 350,000 IP cameras are bought each year in the UK. People seek them for the assurance of a safe home, but some are instead at risk of breaching your privacy. The Internet and media have been flooded with distressing reports of camera hacking. Insecam – a site displaying live feeds from unsecure IP cameras – has called attention to the frequency of invasion into our private lives. With the possibility of broadcasting personal camera-feeds, reporters have rightly identifie...

You Can’t Always Stop A Security Breach, But You Should Always Be Able To Spot It

One year on from the debacle of Target’s security breach and has anything really changed? Despite the weeks of forensic analysis and the astronomical cost incurred by the company, retailer after retailer is still falling foul of the same form of malware attack. So just what is going wrong? The truth is that there is never going to be a 100% guarantee of security – and with today’s carefully focused zero day attacks, the continued reliance on prevention rather than cure is obviously not working. Organisations are blithely continuing day to day operations while an attack is in progress because they are simply not spotting the breaches as they occur. If an organisation wants to maintain security and minimise the financial fall out of these attacks, the emphasis has to change. Accept it: the c...

IT Managers’ Toolkit: Guide To Managed Network Security

IT is a revolving door of change. While most industries have had to get on board with the digital revolution, few have actually had to be the ones to underpin it all. The best and most expensive applications in the world are next to useless if the networks supporting them all aren’t resilient, reliable and configured for change. Here I take a look at the importance of securing your network, as well as the key to making the most of the relationship with your service provider. So what do you need to know and where is this rapidly evolving area of IT heading in the future? Fighting Fires As with most valuable assets, protecting your network is just as important as installing it in the first place. As the complexities of networks have evolved, so too have the malicious ways to infiltrate them....

How To Avoid The Security Pitfalls Of The Internet Of Things

The recent headlines about images from baby monitors, CCTV and webcams being posted on a Russian website highlights the security issues with a connected world. There was never any doubt that the Internet of Things (IoT) would complicate the security landscape at home, at business and on your daily commute. But what is clear from this latest hack is that there is a technology component to IoT security that is not being addressed. It’s called the small business or home network (SOHO). It’s flat and everything with a default gateway to a router is either reaching out to the Internet or potentially accessible over the Internet. That has to stop. Putting anything “directly” on the Internet is a bad idea. There is no reason a baby monitor needs to be internet-accessible to everyone, criminals or...

Should Schools Be Doing More To Prevent Cyberbullying And Internet Trolling?

A recent poll of over 2,000 children found that 35% of 11-17 year olds have experienced some form of cyberbullying with a further 40% having witnessed others being picked on, online. Cyberbullying has become a notorious problem for children and in early 2014, the Department for Education laid out new statutory guidelines named ‘keeping children safe in education’, for education institutions in England on how to keep children safer online. Has this been enough to protect children from cyberbullying? The chairman of the House of Commons’ Education Select Committee, Graham Stuart, recently said that schools in England are failing to tackle cyberbullying and says that more needs to be done to teach children about online abuse on social media sites, the dangers of online abuse and internet trol...

Big Data Needn’t Be A Security Headache

Handling big data in any organisation can at first seem daunting. Not to mention the responsibilities that come with dealing with the vast amount of information contained within it. Naturally, the storage of big data can be a challenge in terms of security for many reasons because the amount of data stored have a direct effect on the consequences of a breach, but it also influences the strategic and tactical approaches that should be taken to ensure compliance and privacy. But it needn’t cause headache. When producing information for big data, organisations have to ensure that they have the right balance between utility of the data and privacy. This follows a process of anonymising the data, encrypting it, putting proper access control in place with security monitoring, risk assessme...

Inside The Hacker’s Head: How Cyber-Criminals Look For Opportunities To Wreak Havoc

Successful hacks can paralyse websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organisation under attack. For many, this begs the question ‘Why us?’ Influence & Power Hacking isn’t always about causing damage, destruction or for financial gain. The objective of many hackers, especially “hacktivists” is purely to raise awareness, influence or to send a political message. The hacker group Anonymous was able to create a massive amount of publicity for itself in the run-up to the World Cup in Brazil by attacking the servers of global sponsors such as Adidas, Emirates and Coca-Cola. Ultimately, the actually damage caused was limited and did not affect the running of the tournament. Nev...