A future with no passwords

numerics_background

I read an interesting little story yesterday about the future of passwords. PayPal executive Jonathon LeBlanc told the Wall St Journal that he thought we were soon to reach a watershed moment regarding the integration of humans and technology – and I mean actual, physical integration. LeBlanc suggested that silicon chips containing all kinds of […]

Information security for the uninitiated: the importance of a risk-based approach

iStock_000020143408Small

Information security is still an area of expenditure that many teams struggle to justify to their boards. Even though all statistical evidence demonstrates beyond doubt that every organisation with an Internet presence is at serious risk and that the damage caused by cyber attacks can cripple businesses, actually demonstrating the value and effectiveness of your […]

Tech Partnership Training Fund – save £500 on the cost of UK cyber security training

TP logo

I am pleased to announce that IT Governance’s cyber security training courses now qualify for up to £500 of funding from the Tech Partnership Training Fund. This scheme provides direct grants to employers in order to stimulate increased investment in IT training that further promotes business growth and competitiveness in the UK. Supported by the […]

Cyber Essentials explained – how to improve malware protection

numerics_background

Malware protection is a key requirement of the UK Cyber Essentials scheme. Malware refers to malicious software (including computer viruses, worms, spyware, botnet software and ransomware) that is specifically designed to gain access to or damage a computer without the knowledge of the owner. Why is malware protection important? Symantec’s Internet Security Threat Report found that there […]

HMG Report – Small businesses: what you need to know about cyber security

Hacker typing on a laptop

Small businesses often fail to address cyber security until it’s too late. The combination of a lack of knowledge and the fear of expense can often lead them to ignore the problem altogether. Statistics show, however, that small businesses are as likely to be attacked as large businesses, if not more so. According to PwC’s […]

Information security for the uninitiated: why is cyber resilience so important?

ddos-attack-protection-plan

Cyber attacks are increasing in severity and frequency to such an extent that it has become almost inevitable that your defences will be breached. And if you do suffer a cyber attack, the chances of your business’s survival decrease significantly. A 2012 study by the National Cyber Security Alliance (NCSA) and Symantec found that 60% […]

Cyber Essentials explained – how to secure boundary firewalls and Internet gateways

Defence shield

‘Boundary firewalls and Internet gateways’ is one of the five controls that organisations are required to implement to comply with the UK Cyber Essentials scheme. Similar to the other controls, this control aims to help mitigate the risks associated with common types of cyber attack, including phishing and hacking. Why are boundary firewalls and Internet […]

Information security for the uninitiated: the information security trinity (people, processes and technology)

iStock_000003863653Medium

Your company’s information assets extend far beyond its confidential electronic records. Valuable information exists throughout the whole organisation, so information security needs to be embedded in the everyday working practices of the whole organisation – that much should be obvious. The best way of maintaining the confidentiality, integrity and availability (CIA) of your information assets […]