Security risk management: ISF identifies the top 6 security risks for 2014

What are the top 6 security threats that will threaten business and enterprise in 2014? Well, according to the Information Security Forum (ISF), the world’s leading independent authority on cyber security and information risk management, the key threats are bring your own device (BYOD) trends in the workplace, data privacy in the cloud, brand reputational …

Read More

Risk management and intrusion protection: effective cyber security is good for business claims Minister

How vulnerable are British businesses to the risk of cyber-threat? How often are networks infiltrated by malicious intruders? The answer according to the government is that business are now more at risk than ever before, and they are encouraging businesses to take proactive steps to protect themselves against those who would exploit their vulnerabilities. Why has this suddenly become such a hot topic? Well, because research commissioned by the Government has revealed that 87 per cent of all UK SMEs and 93 per cent of firms with more than 250 staff had experienced at least one security breach in 2012.

Read More

There’s more to security risk management than just patching

With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. Vulnerability management systems are designed to address these issues. Vulnerability assessment is the process of identifying how vulnerable an infrastructure is to known vulnerabilities—the number one threat to all networks today. The threats/risks found in the vulnerability assessment are then ranked and prioritized to expose the current security position, and to facilitate the re-mediation process.

Read More