This week, Europol launched No More Ransom – a new initiative designed to slow down the huge rise in ransomware we’ve seen over the past year. In the US, meanwhile, Democratic National Committee (DNC) chairwoman Debbie Wasserman Schultz resigned her position as more damaging private emails from DNC members surfaced online. Hillary Clinton’s camp has even gone as far as to accuse Russian spies of the hack.
These are just two major stories from the past few days which remind us that when it comes to cyber security, we’re facing an unprecedented set of challenges. That’s why the theme of this year’s CLOUDSEC London show in September is “Take Control”. We’ve already got a fantastic line-up of some of the industry’s biggest names to help you do just that – so book your place today. Continue reading →
What’s the number one challenge facing CISOs today? It’s not compliance, budgetary concerns, securing cloud computing or even data breaches – as important as all of these issues are. It’s ransomware. Every day there seems to be a new outbreak. The latest is a double-edged attack campaign apparently combining ransomware and DDoS. But while many cybercriminals are keen to exploit your organisation’s weakest point – its users – via web and email channels, some are looking to attack other parts of the IT infrastructure such as the network and servers.
That’s why CISOs need to ensure their organisation implements layered protection covering all possible weak points. It’s the only way to ensure you stand the maximum chance of avoiding ransomware infection. Continue reading →
Cyber security insurance has been offered in some form or another for years. But with Lloyd’s of London recently claiming a 50% increase in demand, UK firms finally seem to be waking up to the benefits. On paper, it can provide much needed financial security in the event of a major data breach, DDoS attack or other cyber incident. But in the fast-moving world of online threats, corporate insurance policies can only go so far.
IT leaders must come to view cyber insurance as complementary to, rather than a replacement for, a comprehensive information security programme. Continue reading →