GRC – Bringing Governance, Risk, and Compliance to Life

GRC – Bringing Governance, Risk, and Compliance to Life

I was recently asked to host a round table discussion on ‘Governance, Risk and Compliance‘ (GRC), and I have to admit I was more than a little excited. Why? Because the other people around the table were leading lights in the world of Cybersecurity, Risk and Resilience, and I was looking forward to exploring how a GRC framework can work across industries and learning some valuable lessons from those around our virtual table.  I was…

Read More

Protecting Your Online Privacy: Three Levels of Security

Protecting Your Online Privacy: Three Levels of Security

Data leaks happen once every few months at least. Millions of users can have their phone number, address, and Social Security Number smeared across the internet in a matter of seconds. Your online browsing behavior is also sold legally by tech companies to the highest bidder. Ever seen an ad that is a little too specific? Most major tech companies rely on some form of data harvesting for revenue. As consumers, should we do anything?…

Read More

REvil Group Demands $70 Million for ‘Universal Decryptor’

REvil Group Demands  Million for ‘Universal Decryptor’

The group behind the crippling supply chain ransomware attack on a US software company has reportedly demanded $70 million in return for a ‘universal’ decryption key, as researchers claim there could be thousands of global victims. It’s believed that the REvil strain was used to compromise Kaseya’s VSA IT management software, although which ransomware affiliate is unknown. However, as reported by the BBC, there has been surprise at the group’s request that the money be paid in…

Read More

Security leadership: 2021 Women in Security

Security leadership: 2021 Women in Security

Security leadership: 2021 Women in Security | 2021-07-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Good-bye, trust-based security – WFH may usher in the age of zero trust

Good-bye, trust-based security – WFH may usher in the age of zero trust

Good-bye, trust-based security – WFH may usher in the age of zero trust | 2021-07-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Identity Protection Service: The Best Solution to a Growing Problem

Identity Protection Service: The Best Solution to a Growing Problem

I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren’t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That’s right, the most valuable data on the internet is the data that comprises your identity. Let’s take a look at what that data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you…

Read More

Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blogs

Identity Protection Service: The Best Solution to a Growing Problem

I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren’t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That’s right, the most valuable data on the internet is the data that comprises your identity. Let’s take a look at what that data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you…

Read More

Identity Protection Service: The Best Solution to a Growing Problem

Identity Protection Service: The Best Solution to a Growing Problem

I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren’t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That’s right, the most valuable data on the internet is the data that comprises your identity. Let’s take a look at what that data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you…

Read More

Attacks on UK Businesses Fall for First Time in Three Years

Attacks on UK Businesses Fall for First Time in Three Years

Recorded cyber-attacks against UK businesses have fallen for the first time since 2018, although hybrid working practices represent an ongoing risk, according to new data from Beaming. The business ISP has been analyzing malicious traffic targeting its customers since 2016, in order to better understand the threat landscape. It claimed that threat volumes dropped by 9% year-on-year in the second quarter of 2021, bringing them down to levels similar to Q1 2021 when businesses suffered just over…

Read More

How to write an ISO 27001 access control policy – free template

How to write an ISO 27001 access control policy – free template

Access control policies are an unquestionably important part of ISO 27001. The requirements for producing one are outlined in section A.9 of Annex A, which contains 14 controls. In this blog, we explain what Annex A.9 covers and what your access control should include. What is Annex A.9 of ISO 27001? Annex A.9 of ISO 27001 helps you govern who has access to your organisation’s sensitive information and under what scenarios. This helps secure your…

Read More
1 2,198 2,199 2,200 2,201 2,202 2,586