by Bharat Mistry
For the past 12 years, Verizon has been publishing its Data Breach Investigations Report (DBIR). Whilst not the final word on the threat landscape, it always offers some interesting insight into current trends — this year distilled from over 32,000 analysed “incidents” and nearly 4,000 breaches worldwide. That’s why it was interesting to note the uptick in cloud-based threats stemming from external malice and insider error revealed in this year’s report.
The good news is that Trend Micro helps global organisations mitigate both types of cyber-risk; providing peace-of-mind to support employee productivity in a current climate of mass remote working.
by William Malik
“Alexa, turn on the TV.”
”Get it yourself.”
This nightmare scenario could play out millions of times unless people take steps to protect their IoT devices. The situation is even worse in industrial settings. Smart manufacturing, that is, Industry 4.0, relies on tight integration between IT systems and OT systems. Enterprise resource planning (ERP) software has evolved into supply chain management (SCM) systems, reaching across organizational and national boundaries to gather all forms of inputs, parting out subcomponent development and production, and delivering finished products, payments, and capabilities across a global canvas.
Each of these synergies fulfills a rational business goal: optimize scarce resources across diverse sources; minimize manufacturing, shipping, and warehousing expense across regions; preserve continuity of operations by diversifying suppliers; maximize sales among multiple delivery channels. The supply chain includes not only raw materials for manufacturing, but also third party suppliers of components, outsourced staff for non-core business functions, open source software to optimize development costs, and subcontractors to fulfill specialized design, assembly, testing, and distribution tasks. Each element of the supply chain is an attack surface.
Ask any successful CEO what their secret is and the answer will probably be the same: “listening to our customers.” The problem is that, too often, organisations lose that connection with the people and organisations that use their products. They end up giving end-users what they think they want instead of what they actually need. In cybersecurity, where the market moves at lightning speed in response to a rapidly evolving threat landscape, this is commonplace. It can also be fatal for a vendor.
That’s why we’re delighted to welcome our latest member of the Trend Micro UK team: Kiran Khokhar. We are looking forward to having Kiran join our team of spokespeople, as she understands exactly what customers are going through. This is because she used to be one.
By Joe Ashton
For organisations up and down the country, the past month has been a steep learning curve. The IT and security functions have never been more vital to ensuring business-as-usual, as hundreds or thousands of employees transition to remote working. Cyber-criminals have also been quick to adapt to the rapidly changing situation, making it crucial that CIOs and CISOs have the right tools, processes and policies in place to support productivity whilst managing risk effectively.
This is where Trend Micro has been able to offer its unique expertise as a trusted security partner.