Last week, hundreds of German celebrities, politicians and others were hit by what has been described as the biggest data leak of its kind in the country’s history. It has since emerged this week that a 20-year-old living with his parents has confessed to the authorities, claiming he acted alone. If nothing else, it should remind IT security bosses in the UK of the persistent threat from hacktivists, and the need to double down on best practice cybersecurity in 2019. Continue reading →
Tens of thousands of technology enthusiasts are descending on Las Vegas for the annual CES show next week, many of them keen to see the latest innovations in connected gadgets. The Internet of Things (IoT) will have a bigger presence than ever at the event: a reflection of its increasingly important role in the corporate and consumer world. But as Trend Micro outlined in its 2019 predictions report, the IoT also represents a major security threat, which could impact manufacturers, service providers and end user organisations in a variety of ways.
As we start a new year, the only way to mitigate this risk is to work together across industry to improve security throughout the entire IoT ecosystem. Continue reading →
Consumer and enterprise security are usually treated as two discrete areas. But increasingly in 2019 we’ll see a convergence of threats. Ultimately, every employee is also a consumer — one who may work from a home filled with unsecured smart devices, exposing corporate systems and data to new threats.
The coming year therefore requires enterprise IT security teams to think more broadly about the risks facing their organisation, and ensure they have the policies and technologies in place to mitigate them. Continue reading →
It’s that time of the year again when we look to the future to arm cybersecurity professionals with a few predictions of what might head their way in 2019. But the truth is that there’s little in store that they’ve not seen already. In fact, the defining threat trends of the coming year may well be those that have plagued organisations for the past decade: vulnerabilities, stolen credentials and social engineering.
The best way to equip your organisation against these going forward is to follow best practices, layer up defences across the IT infrastructure and improve user awareness programmes. Continue reading →