So far, 2019 is looking very similar to last year. We’re only a month into the new year and already the headlines have been filled with news of data breaches, privacy leaks and credential stuffing attacks. And all this as GDPR regulators begin to flex their muscles by levying financial penalties. To stay clear of regulatory trouble and minimise cyber risk, IT teams should remember the best practice basics and layer up multiple connected threat defence tools. Continue reading →
Last week Facebook and Google hit the headlines yet again for the wrong reasons after they were found to have bypassed Apple’s strict approvals process to distribute data harvesting apps to users. In Facebook’s case, the firm paid users as young as 13 in return for downloading the market research app. Critics claim it was less than open about the privacy-invading purposes of the app, and that its parental consent ‘checks’ could be easily faked.
It has all served as a timely reminder of the privacy and security risks families are exposed to on a regular basis today, as we celebrate Safer Internet Day (SID) around the world tomorrow, on the 5th February. Continue reading →
Last week, hundreds of German celebrities, politicians and others were hit by what has been described as the biggest data leak of its kind in the country’s history. It has since emerged this week that a 20-year-old living with his parents has confessed to the authorities, claiming he acted alone. If nothing else, it should remind IT security bosses in the UK of the persistent threat from hacktivists, and the need to double down on best practice cybersecurity in 2019. Continue reading →
Tens of thousands of technology enthusiasts are descending on Las Vegas for the annual CES show next week, many of them keen to see the latest innovations in connected gadgets. The Internet of Things (IoT) will have a bigger presence than ever at the event: a reflection of its increasingly important role in the corporate and consumer world. But as Trend Micro outlined in its 2019 predictions report, the IoT also represents a major security threat, which could impact manufacturers, service providers and end user organisations in a variety of ways.
As we start a new year, the only way to mitigate this risk is to work together across industry to improve security throughout the entire IoT ecosystem. Continue reading →