Cyberattacks affect ‘nearly every single company’

Around eight in every 10 cybersecurity executives admit their company has been compromised by a cyberattack in the past 24 months, according to a new KPMG report. In a survey of 403 CIO, CISO and CTOs working in the retail, automotive, banking and technology industries, it was found that 81% had experienced some form of … More Cyberattacks affect ‘nearly every single company’

Firefighting, security and compliance

FireMon conducted a survey at Infosec Europe this year and apparently discovered that cybersecurity professionals manage to be both overworked and underutilized. That’s a feeling which I’ve been quite familiar with myself from time to time over the years, but I was a little surprised that the article cited above was entitled ‘Tired of fighting fires … More Firefighting, security and compliance

‘Ruthless’ cybercriminals pose a major threat to organisations

Organisations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG. The paper, titled Taking the Offensive – Working together to disrupt digital crime, states that enterprises have to appreciate that the threat landscape has changed. One of the key developments has been the shift towards … More ‘Ruthless’ cybercriminals pose a major threat to organisations

The 5 most common reasons for corporate data loss

There is no doubt that one of the main assets of a company is the data it stores. Information about customers, employees and finances, among other types of records, should be adequately protected and available whenever they are needed. For this reason, companies that appreciate the value of their data, invest adequate resources into protecting them and recovering them … More The 5 most common reasons for corporate data loss

After authentication comes authorisation and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply … More After authentication comes authorisation and access control