Cyber security: ‘resilience’ is the key to thwarting cyber-attacks

Can any business ever defend against every potential cyber-attack or protect its networks from hackers? The short answer to that is no. Determined hackers are enterprising and surprisingly skilled at finding even the smallest chink in your business’ security network. So does that mean you shouldn’t bother with security at all? Well, no: on the …

Read More

Cyber-crime: Cisco claims retailers remain one step behind hackers

What lessons have we learned from last year’s massive cyber-attack on Target where hackers seized the personal and bank card information of more than 110 million customers? Well, according to Cisco Systems, the global networking and technology giant, the answer is not a lot. Yes there has been a scramble to come up with some …

Read More

New study shows that most SMEs mistakenly believe they are immune from cyber-attack

Do owners of small and medium-sized business ever considered the fact that they may at some stage face the prospect of cyber-attack? The chances are the answer to that question is no. The reason for this is that they feel they are not big enough, or important enough to warrant attention from hackers; after all, …

Read More

Cyber-defence: insurance is no substitute for security claim insurance underwriters

The UK’s leading energy companies have taken a battering over recent months, not just from the elements, but also from the insurance companies they have previously relied upon. It isn’t the high level of claims that are causing sleepless nights for insurance underwriters however: it’s the industry’s weak cyber-defences. Leading underwriting firms have expressed deep …

Read More

ISO 22301 v BS 25999: what’s the difference?

What is ISO 22301? ISO 22301 has been developed to help organisations minimize the risk of disruptions. ISO 22301 standard replaced the current British standard BS25999-2. ISO 22301 is the world’s first international standard for Business Continuity Management (BCM) which can be used by organisations of all sizes and types. These organisations will be able …

Read More

Cyber-attacks: someone’s got a big new cannon claims Cloudfare’s chief executive

How seriously should governments and businesses take the threat of cyber- attack? Well, in the view of Matthew Price, chief executive of online security experts, Cloudfare, the answer is very seriously indeed. On his social media account he highlighted the scale of the problem by tweeting: “Someone’s got big new cannon – start of ugly …

Read More

Security risk management: Kaspersky Labs identify cross-platform Java Bot used for DDoS attacks

Throughout much of 2013 Oracle and its programming language, Java, was rarely out of the news. However, since its Critical Patch Update (CPU) release in October 2013, things have remained relatively quiet. Until now, that is. Unfortunately Java-related security issues are once again making the headlines. Kaspersky Labs, have recently discovered more botnet malware designed …

Read More

Cyber security: 12 internet users worldwide fall victim to cyber criminals every second claims new report

What’s the likelihood of your business being attacked by cybercriminals? Well, according to a recent report from Russia’s Interior Ministry, the answer is probably more likely than you might have expected. What happens in Russia might not appear to be especially relevant to UK businesses, but the issue of cybercrime transcends national borders: cyber-criminality has …

Read More

Why does your organisation need to comply with the ISO 27001 standard?

It’s often stated that knowledge is power. In today’s digital world, however, it’s information that governs power and success, particularly in a business context.  Information is one of, if not the most, valuable assets that any business owns. Unfortunately whilst many organisations are practiced at gathering information, they are rather less adept at organising and …

Read More

Security risk management: EMC latest SBIC report offers recommendations to overhaul outdated and inadequate information security processes

The security division of EMC released its latest security report this week. The aim of EMC security division’s  latest Security for Business Innovation Council (SBIC) report is to provide guidance on how organisations can gain competitive advantage by transforming many of the outdated and inflexible IT security processes which govern the use and protection of information …

Read More

Nearly 100,000 travel insurance customer’s credit card details compromised in cyber-attack

2013 ended just as it had begun with yet another cyber-attack against a firm holding customer data. The personal and confidential information of thousands of Staysure customers was stolen by hackers. The cyber-attack saw the credit card details of nearly 100,000 travel insurance customers compromised. The travel insurance provider has revealed that card payment details …

Read More

Security risk management: Cyber-criminals will increasingly target mobile and BYO devices during 2014

Where will the biggest cyber security risks come from in 2014? Which new threats are businesses likely to face, and which vulnerabilities are most likely to be exploited by unscrupulous hackers? Well, according to security behemoth, McAfee, the major threat will come from ransomware – a type of malicious software that can be installed on …

Read More

Security risk management: ISF identifies the top 6 security risks for 2014

What are the top 6 security threats that will threaten business and enterprise in 2014? Well, according to the Information Security Forum (ISF), the world’s leading independent authority on cyber security and information risk management, the key threats are bring your own device (BYOD) trends in the workplace, data privacy in the cloud, brand reputational …

Read More

NatWest online services hit by cyber-attack

If ever proof were needed that hacking is still an ongoing and persistent threat and that every business needs to beef up its defences against cyber-attack, then the experiences of Royal Bank of Scotland Group should serve as a salutary lesson for every organisation. Already unpopular for numerous well-documented reasons, RBS and Nat West took …

Read More

Webinar – Secure and Accelerate Your Web Apps

Krypsys has a long pedigree as a leading European specialist in Barracuda’s WAF technology and we are applying this experience and expertise to help ADC customers. If you would like to find out how these solutions could help you protect and optimise your web applications, please feel free to attend this lunch-time webex event. Reserve a place on this Webex by using the booking form below. 

Webex scheduled for:-

  • Tue 8th July 2014 | 1:00pm – 1:40pm

Read More