9/11 – Twenty Years on

The advances in technology since then can now allow an attacker to achieve wide reaching consequences without having to be physically present at the target. The combination of cyber-attacks and physical attacks place even greater demand on security professionals to manage the risk. When the September 11 attacks were carried out, terror groups had a minimal online presence. Changes in technology have allowed these groups to embrace the anonymity the internet can provide to further their activity.

Continue Reading

GDPR – The Cyber Criminal’s Friend

Since GDPR came in there have been a few changes in the cyber landscape and one significant change is the rise of ransomware. It is simply everywhere. When you first look you may be forgiven for thinking that it is particularly prevalent in the USA. And yes, that is partly true, but the reason for that is that by US law, a company must declare when they have had a data breach. Since 2002, the US Data Breach Notification Laws state that a company has 10 days to notify the authorities of a data breach. That, from a mapping point of view, is what makes the US look like a hotspot.

Continue Reading

Construction Industry – Threat Assessment August 2021

The construction industry may not appear to be an obvious target for cybercrime. The industry has an image of being a physical world industry with no connections to the digital one. If only that was true. The construction industry is being sought out by threat actors as the next easy target. In 2020 the average cost of the data breach within the construction industry was $4.99 million US dollars.

Continue Reading

Ransomware – Do I need Cyber Insurance

Ransomware incidents continue to feature in the international as well as IT industry press, with recent high profile victims being JBS Foods, Fujifilm, Colonial Pipeline, Ireland's Health Service Executive, and AXA Insurance. Less well publicised are the many smaller organisations that are held to cyber ransom.

Continue Reading

Preparing for the Inevitable

“There are two types of companies: those that have been hacked, and those who don't know they have been hacked.” This aphorism is generally accepted within the information security and wider risk management industries as being true. If we accept that this is the case, then it is logical that we should prepare our companies for cyber-attacks, not only for the breach itself but also how they should respond.

Continue Reading

End of content

No more pages to load

Close Menu