Published 10 Feb 2017
Getting your awareness training right is essential for cyber resilience Cyber-related fraud is at its highest level since 2008 according to the latest research – a stark fact that makes information security awareness learning for employees more vital than ever. The recen...
Published 20 Jul 2016
Okay, I don’t usually quote Shakespeare, but there’s one line that I’ve remembered since I was at school in England. It comes from Othello : “Reputation, reputation, reputation! O, I have lost my reputation! I have lost the immortal part of myself.” All the publicity aro...
Cyber resilience|Cyber-attack|Identity|IT services|RESILIA|Vulnerability
Published 27 Jul 2016
During the run-up to the US election there’s been a lot of talk about who’s for real and who’s faking it. Who you would like to have a beer with, and who you’d trust with the economy. When I saw a headline about a ‘Fake President Scam’ the other day, I thought it was about ye...
Published 26 Jul 2017
Ever had the nightmare of your company being hacked and it making national news? Have you ever stood in front of your board and felt like saying ‘I told you so’? This is exactly what happened to one CSO (Chief Security Officer) in our real-life C yber Stories from the Frontl...
Published 24 Aug 2017
Phishing , Trojan Horses, Malware, Whaling , Denial of Service – these are all terms that have become common currency in the world of cyber security. With increasing public exposure of global organizations’ cyber security vulnerabilities , the language of cyber threats a...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|RESILIA|Threats|Vulnerability
Published 17 Apr 2015
Politics often throws up examples of highly memorable, and equally emotive, language designed to make voters think a certain way about a particular party. The UK’s current election fever is no different, with politicians coining the rather loaded phrase, “Weaponizing the NHS...
Published 17 Aug 2016
Why is there an obsession with where a cyber-attack originates? In recent reports about attacks on SWIFT (the global financial messaging service) at various banks, there was speculation that it may have been the work of well-skilled and motivated groups creating malware. T...
Published 23 Apr 2015
When I read about the latest cyber attack in the press I wonder how the ordinary person in the street is responding to the same story. Do they feel interested or intrigued? Do they want to understand more? Do they feel that they have a part to play? I suspect most don’t but i...
Published 05 Oct 2016
Cyber security, today, is often very technology-based with a focus on technical issues such as firewalls and virus scanning software. While technology is an important part of the cyber defence, it is important not to neglect strategy in identifying what controls an organi...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 21 Oct 2016
I n recent years Romania and, more broadly, South East Europe have become a hotbed for international IT services. Due to the region’s Internet of Everything approach, the IT market is booming and facilities like Security Operations Centres (SOCs) and Network Operation Centres...
Communication|Continual Service Improvement (CSI)|IT services|ITIL|Processes|Resource management