There’s a major new piece of EU cybersecurity-related legislation landing in May, but it might not be the one you’re thinking of. Most UK organisations have their eyes firmly focused on the General Data Protection Regulation (GDPR). But arguably just as important for companies operating in critical infrastructure sectors is the new Security of Network and Information Systems (NIS) Directive. It introduces a range of best practice security steps which organisations must follow: fail to do so and you could face a GDPR-sized fine of up to £17m.
The government has already committed to transposing the directive into UK law irrespective of Brexit. With a 10 May deadline looming, the clock is ticking. Continue reading →
There’s not been much to celebrate in cybersecurity recently. The shadow of the Equifax breach still hangs over the industry as a cautionary tale of what can happen if security processes and execution aren’t 100% watertight. In fact, Europol last week reported stats claiming over two billion records on European citizens have been leaked over the past 12 months. While there’s clearly lots to do, it was heartening to see the UK’s National Cyber Security Centre (NCSC) this week reporting a successful first year in operation.
The GCHQ offshoot claimed to have dealt with 590 “significant” cyber threats reported over the 12-month period. While we’re 100% behind its work, it’s obvious the scale of the problem and the determination of online attackers continues to rise. That means organisations must also take matters into their own hands with best practice, layered cybersecurity. Continue reading →
Cloud 2.0: that’s the buzzword analysts are applying to the new wave of cloud adoption we’re likely to witness this year. It will see those tried and tested benefits of cost savings, greater business agility, scalability and IT efficiency help to drive new digital transformation projects. This is particularly important in the public sector, where the need to deliver services in more innovative and efficient ways is greater than ever. But there remains one major barrier to such projects: cybersecurity. Continue reading →