Last week Facebook and Google hit the headlines yet again for the wrong reasons after they were found to have bypassed Apple’s strict approvals process to distribute data harvesting apps to users. In Facebook’s case, the firm paid users as young as 13 in return for downloading the market research app. Critics claim it was less than open about the privacy-invading purposes of the app, and that its parental consent ‘checks’ could be easily faked.
It has all served as a timely reminder of the privacy and security risks families are exposed to on a regular basis today, as we celebrate Safer Internet Day (SID) around the world tomorrow, on the 5th February. Continue reading →
Last week, hundreds of German celebrities, politicians and others were hit by what has been described as the biggest data leak of its kind in the country’s history. It has since emerged this week that a 20-year-old living with his parents has confessed to the authorities, claiming he acted alone. If nothing else, it should remind IT security bosses in the UK of the persistent threat from hacktivists, and the need to double down on best practice cybersecurity in 2019. Continue reading →
Tens of thousands of technology enthusiasts are descending on Las Vegas for the annual CES show next week, many of them keen to see the latest innovations in connected gadgets. The Internet of Things (IoT) will have a bigger presence than ever at the event: a reflection of its increasingly important role in the corporate and consumer world. But as Trend Micro outlined in its 2019 predictions report, the IoT also represents a major security threat, which could impact manufacturers, service providers and end user organisations in a variety of ways.
As we start a new year, the only way to mitigate this risk is to work together across industry to improve security throughout the entire IoT ecosystem. Continue reading →
Consumer and enterprise security are usually treated as two discrete areas. But increasingly in 2019 we’ll see a convergence of threats. Ultimately, every employee is also a consumer — one who may work from a home filled with unsecured smart devices, exposing corporate systems and data to new threats.
The coming year therefore requires enterprise IT security teams to think more broadly about the risks facing their organisation, and ensure they have the policies and technologies in place to mitigate them. Continue reading →