Cyber Security Management Trends for 2018

Cyber Security Management Trends for 2018

According to our customers and security commentators here are some major trends that will be a feature of Cyber SecurityManagement in 2018. Cyber Security Resource Shortage The shortage of cybersecurity-skilled individuals will continue to be problem during 2018. Globally, many thousands of cybersecurity roles remained unfilled during 2017. Based on the numbers of qualified and …

Read More

Is Encryption Mandatory for GDPR Compliance?

Is Encryption Mandatory for GDPR Compliance

Most people in the Information Security/Data Governance world at the moment are consumed with thenew General Data ProtectionRegulations (GDPR) which come into force on May 25th, 2018. The changes it brings are significant and will have an impact on every UK citizen. This article is not going to explain the multitude of changes or cringe …

Read More

Do You Need Penetration Test for the GDPR?

Do You Need Penetration Test for the GDPR

Do you need penetration test to comply with GDPR? The GDPR requires that you assess applications and criticalinfrastructurefor security vulnerabilities and that the effectiveness of your security controls are tested regularly.  Services such as penetration testing and regular vulnerability assessments will help meet this requirement. The GDPR brings a number of changes including breach reports being legally required within …

Read More

Security Requirements of the GDPR

Security Requirements of the GDPR

The GDPR requires that “Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures …

Read More

The Latest Trends in BYOD

The Latest Trends in BYOD

BYOD policies have become a common fixture, particularly in larger organisations, and seem set to stay. Despite concerns about security breaches, governance issues, device management and a range of other possible complications, businesses’ perception seems to be that the benefits outweigh the potential issues. Indeed, a recent survey of BYOD trends revealed that adoption rates …

Read More

Is Azure More Secure Than AWS

Is Azure More Secure than AWS

The move to cloud continues to grow at pace, with most IT departments looking at Azure and AWS as the two the main options to consider. For each individual use case, there will be a number of requirements to consider including what applications will be deployed, existing skill base and cost. We would hope that security …

Read More

Data Protection – GDPR Checklist

Data Protection - GDPR Checklist

The General Data Protection Regulation (GDPR) requires that, by 2018, any company that wishes to do business in the EU, will need to collect, store and use personal information more securely. Companies that have not started addressing this yet will, potentially, have a lot of the compliance work to get through in 2017. With the …

Read More

2016 Cyber Security Trends Summary

2016 Cyber Security Trends Summary

The majority of UK businesses now recognise the importance of cyber security. This, in part, has been driven by the fact that E-commerce has become much more important to UK companies and has doubled since 2008. Added to that, media coverage of high-profile breaches and their consequences has moved cyber security up the corporate agenda. …

Read More