Tag Archives: data protection

It’s Time to Up Cyber Maturity Levels in 2017 – Starting with the Endpoint

by Bharat Mistry

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

A good way to start the new year would surely be to consider how your organization can be smarter about security in 2017. And that means taking a look first at the endpoint.

Another year of breaches
Even before the catastrophic breaches at Yahoo, which may have affected over 1.5 billion accounts, were revealed, this was already shaping up to be another epic year for the black hats. Perhaps most worrying from the stream of breach incidents we’ve all read about in the news over the past 12 months is the fact that organisations are still making the same old mistakes.

Newly released data from UK-based insurer CFC Underwriting makes for particularly uncomfortable reading. It reveals that firm handled more than 400 claims on cyber breach policies this year – with the main categories being privacy breaches (31%), financial loss (22%) and ransomware (16%). Now, we don’t have mandatory breach reporting laws in the UK – not until the European GDPR comes into force in 2018, at least. So this is an interesting reminder that, while we might not always hear about them, security incidents are happening – and affecting UK firms every day.

More concerning still is that UK firms apparently represent 8% of the insurer’s policy count, but 17% of its claims count. Why does the UK have a disproportionately high volume of claims? CFC reckons because of the low cybersecurity maturity of these organisations.

Start with the endpoint
A comprehensive approach to cybersecurity of course requires multiple layers of protection including web and email gateways, networks and servers – not forgetting the vital “people” and “policy” elements. But many of the attacks which have led to damaging breaches over the past year started at the endpoint – the initial incursion point into the corporate network. We therefore need to start our efforts by better protecting this layer of infrastructure – but it’s not easy given the explosion in endpoints facilitated by cloud, mobile and IoT technologies.

Trend Micro’s answer is XGen: a cross-generational approach reliant on multiple layers of protection. None of these are a silver bullet on their own. But together they can form a formidable defence against the vast majority of known and unknown threats.

It should feature signature and non-signature based tools, including behavioural based filters, app control, exploit prevention and machine learning. The latter has been used for years by Trend Micro. But in this context we’ve made it even more effective at stopping threats by designing capabilities which extract and analyse a suspect file’s characteristics before and during its execution. This helps to reduce false positives and improve accuracy.

Endpoint compromise can play a vital role early on in the cyber kill chain. As we head into 2017, don’t underestimate the importance of gaining visibility and control at this layer. With huge regulatory pressure coming from Europe in 2018, no CISO can afford to ignore it.

 

 

CLOUDSEC London Returns to Help You Take Control of Security

by Ross Dyer

This week, Europol launched No More Ransom – a new initiative designed to slow down the huge rise in ransomware we’ve seen over the past year. In the US, meanwhile, Democratic National Committee (DNC) chairwoman Debbie Wasserman Schultz resigned her position as more damaging private emails from DNC members surfaced online. Hillary Clinton’s camp has even gone as far as to accuse Russian spies of the hack.

These are just two major stories from the past few days which remind us that when it comes to cyber security, we’re facing an unprecedented set of challenges. That’s why the theme of this year’s CLOUDSEC London show in September is “Take Control”. We’ve already got a fantastic line-up of some of the industry’s biggest names to help you do just that – so book your place today. Continue reading

Business as Usual for GDPR Compliance Despite Brexit

by Ross Dyer

All over the UK people woke up this morning to something many thought would not happen: Britain voting to leave the European Union. It will take years and possibly even decades before we fully appreciate the repercussions. But from a data protection and privacy perspective, little in reality will change. The UK can’t afford to let its digital economy be locked out of Europe, which is why the government is likely to enforce laws on a par with the forthcoming European General Data Protection Regulation (GDPR)

The message is clear for UK IT security bosses: stay on the path towards GDPR compliance. Continue reading

Strategies to Avoid Becoming the Next LinkedIn, Tumblr or MySpace at Infosecurity Europe 2016

by Bharat Mistry

Another week, another data breach – or rather, another four. All the cyber security chatter over the past few days has been around revelations of historical mega breaches at some of the world’s best known web companies. And while it shouldn’t be surprising that big name firms are still getting breached – albeit tech companies that should really know better – it’s concerning that some apparently lacked the visibility to realise until years later the sheer scale of customer data theft from their organisations.

The incidents raise rather fortuitously some key points around layered threat prevention, vulnerability protection and breach reporting which Trend Micro will be discussing at length at Infosecurity Europe 2016 next week. Continue reading