A new poll has revealed that many MPs regard cyber-attacks on the UK’s critical national infrastructure (CNI) as the biggest online threat facing the nation. The good news is that we have an EU law to tackle exactly this challenge: the NIS Directive. But effective compliance will only be possible if organisations working in these sectors get better at bridging the traditional divide between IT and OT. Continue reading →
This week the FBI announced a major international law enforcement operation spanning six months which resulted in scores of arrests and serious disruption to several Business Email Compromise (BEC) campaigns. At Trend Micro we welcome any efforts designed to make it harder for the black hats to make money from their illicit schemes. But we can’t rely on law enforcement alone.
Organisations must also get proactive by improving staff training and education and ensuring they have the kind of email protection capabilities which can spot and block BEC scams. Continue reading →
This year’s Infosecurity Europe will be the first to take place under the new data protection regime brought in by the long-awaited EU GDPR. It’s going to be interesting to see how much coverage the new law gets. I’d wager, more than you’d think, because compliance doesn’t end on 25 May — for many firms, it will only start once the reality of the new legislation hits home. As we were reminded this week by a £120,000 fine handed down to Greenwich University, the regulator will come down hard on organisations that fail on cybersecurity. Continue reading →
The Internet of Things (IoT) offers tremendous value to organisations, their customers and employees, driving business agility, productivity, cost reductions and much more. That’s why the total number of connected things is predicted to top 20 billion by 2020. Unfortunately, this IoT explosion also creates unique opportunities for cybercriminals. Of these, attacks which impact the physical world are arguably the most serious, potentially leading to costly service disruption and even loss of life.
That’s why we’ll be sharing some key best practice tips with attendees at Infosecurity Europe next month on how organisations can mitigate the risks of IoT-powered cyber-physical attacks. Continue reading →