We all know the job of the under-pressure IT boss is getting harder by the day. And as recent revelations from WikiLeaks have shown us, it’s not being made any easier by those institutions nominally designed to keep us safe. With the likes of the CIA allegedly actively developing exploits, the threat landscape is certainly broader and more complex than it has ever been, and that makes mitigating information security risk all the more challenging. That’s why Trend Micro runs events like yesterday’s TECHDAY. They offer a great opportunity for IT practitioners to learn from some of the leading figures in the industry, as well as network with their peers.
Interestingly, some of the key take-aways for Trend Micro after the event were the number of attendees who ranked user education as their top challenge for the year ahead. Continue reading →
The UK’s IT decision makers have it pretty tough. On the one hand the sheer range, volume and persistence of threats today make it virtually impossible to keep digital corporate assets 100% safe. But on the other, the outrageous hyperbole spread by security vendors in what is an increasingly crowded market makes finding the right tools more challenging than it’s ever been. In these situations, the opinions of journalists, independent reviewers and customers themselves become incredibly important. Continue reading →
We all know that ransomware is one of the biggest threats facing UK organisations today. You only have to take a look at the headlines to see the havoc it’s wreaking all over the country, and the world. But although the broad message seems to be getting through, Trend Micro research has revealed a troubling lack of awareness when it comes to the details.
As we head towards VMworld Europe in a fortnight it’s worth remembering that only a layered approach to protection offers the best chance of success. That’s because corporate servers are increasingly being singled out by the black hats as vulnerable targets. Continue reading →
The UK’s IT leaders are facing an unprecedented and unenviable set of security challenges today. Threats could come from anywhere in the world, and any source – be it financially motivated cybercrime gangs, determined state sponsored operatives or ‘lone wolf’ hacktivists. People and process are of course an important part of the fightback. But so too is having the right technology to hand to keep today’s huge range of threats at bay.