Though ransomware has stolen much of the limelight over the past two years, following the unprecedented WannaCry and NotPetya attacks of 2017, the biggest threat to businesses remains, and may be increasingly, that of Trojan horse malware.
Two things can be expected from any field at the start of a new year. First, a look back at the events of the previous year. Second, a rather more risky look ahead at the year to come, complete with predictions and premonitions. This is true in the cyber security field as much as in any other.
As in every industry—particularly technology-centric ones—the history of the cyber security industry has been one of task automation. From the early days (some may say Gen I days) of firewalls and pattern-matching antiviruses to modern techniques of machine learning-based malware detection and traffic analysis, the tools available to a security-minded business are constantly growing in complexity, in an arms race with cybercriminals whose malware has been doing the same.
One of the most seismic events in information security last year was undoubtedly the entry into force of the EU’s General Data Protection Regulation (GDPR), perhaps the most radical shift in data protection thinking since people started to require secret passwords to access a person’s account. The GDPR hysteria has settled down somewhat since May, but it has become clear that the Regulation represents a wider shift in approach to data protection and consumer privacy, and things will not end here.
The Lexcel v6.1 standard makes Cyber Essentials accreditation itself optional, but what is Cyber Essentials, and why should your practice aim to achieve it regardless?
With data breaches of major tech. firms—your Googles and your Facebooks, for example—eating up all of the news coverage throughout the year, it’s easy for owners and employees of smaller to medium-sized enterprises (SMEs) to grow complacent. ‘They wouldn’t bother to attack little old me’, you might be thinking, but security through obscurity is no security at all.
This article will hopefully help to explain what end-of-lifing means to you, as well as steps you can take to ensure that you can be secure in a year.
A recent article in IEEE Security & Privacy—“Teaching Authentication as a Life Skill”—detailed the results of a team of Swiss researchers and their attempts to …
Ransomware attacks are amongst the most-discussed new threats to have emerged in the past few years, but what is ransomware, how can it impact your business and how can you protect yourself against it?
Ultimately, whether you in-source or out-source your security, or some hybrid of the two, you will need a range of tools and services to ensure you make a success of it. Luckily, Mitigate Cyber Security have something for every occasion.