Every year Gartner publishes its Magic Quadrants covering numerous markets within the technology sector. In February, Gartner released the Magic Quadrant for Managed Security Services, Worldwide; an area that we, as cyber security service providers, are particularly interested in. Managed security services covers a broad range of service providers, consultants and vendors. It is Gartner’s … Continue reading Where’s the magic in Gartner’s quadrant?
Here’s how most articles about GDPR start … Have you heard of GDPR? Do you know that it’s coming into force soon? Did you know that if your business falls foul of GDPR it could face hefty fines? Not doubt you’ve come across many articles, blog posts, videos, webinars and workshops about GDPR, and some … Continue reading GDPR: Beware of business ambulance chasers
Many of our customers have been asking about Artificial Intelligence (AI) and Machine Learning: asking whether AI tools exist that can protect their businesses more effectively than conventional cyber security solutions. AI is very much a buzzword in IT and security at the moment, there’s a vast amount of potential in this technology and businesses … Continue reading AI and cyber security – does it exist?
One significant frustration for CIOs, CISOs and senior IT professionals charged with data and system security is that, while there are many solutions on the market that provide tools for monitoring and detecting threats, most are prohibitively expensive and often out of reach for small businesses with limited IT and information security budget. This results … Continue reading Next gen cyber security that’s revolutionary priced
Cyber attacks in the retail and FMCG sector are not confined to ecommerce businesses such as with online payment fraud or distributor denial of service (DDoS) attacks. While these are a concern for many retailers selling online as well as in store, cyber attacks affect all merchants. That’s because it’s not just about stealing goods … Continue reading Think retail is safe from cyber attacks? Think again…
2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data breaches and cybercrime resulting in a steady stream of headlines; WannaCry, Bashware, Shadow Brokers, Petya, Cloudbleed, the list goes on… As we start to turn our attention to 2018, it’s time to think about how to … Continue reading Things to consider when choosing a cyber security vendor
We know, it’s not your fault. You joined a financial services firm and inherited processes, software and systems that were installed by your predecessor, if not before. Given the choice we know you would like a fresh start; but budgets, internal politics and potential disruption often make it difficult to upgrade and put alternative solutions … Continue reading The problem with your inherited legacy systems
Building your business’ reputation and brand image takes time - years even - and costs money. Investment in marketing, customer services and PR activities does not come cheap, yet it could all be written off with a single data breach. While many high profile enterprises appear to be able to ride out the storm of … Continue reading Protect your brand and reputation with these 5 ways to minimise data breaches
https://blog.checkpoint.com/2017/09/11/beware-bashware-new-method-malware-bypass-security-solutions/ It is picking up a lot of chatter amongst the security and IT community, and we suspect will soon be as widely spoken about as HeartBleed. Criminals are exploiting the fact that Windows 10 now lets you run a Linux Shell natively and are writing their malware to run within this Linux Shell in … Continue reading You’ll probably shortly be reading about a new piece of nastiness in security called Bashware:
For the recruitment industry, candidate data is what differentiates a successful recruitment agency or recruiter from those that fail to hit target. Recruitment agencies spend many years building up and nurturing their lists, and therefore they are valuable IP. Once upon a time this data existed in the filing cabinets that used to flank the … Continue reading Recruitment agencies and their candidates are a key target for today’s cyber-criminals