Policies

Employees playing Facebook quizzes could put their employers at risk

Employees playing Facebook quizzes could put their employers at risk

Paul Bischoff explains that companies should educate their employees on the importance of Facebook privacy and other data-gathering apps that can potentially compromise both personal and company security.

Russia may ban government officials from using Google and WhatsApp

Russia may ban government officials from using Google and WhatsApp

By

Russian government moves to implement partial ban on foreign technology which is seen as a threat to national security.

Putting people at the heart of your IT policy: Five tips to get it right

Putting people at the heart of your IT policy: Five tips to get it right

IT security policies must evolve to embrace sensible policies for bring-your-own-device (BYOD), says Chris Mayers.

Ensuring your security policy works

Ensuring your security policy works

Alex Vovk explains how to leverage security policy and ensure it's performing correctly to prevent a data breach.

Macro malware epidemic returns

Macro malware epidemic returns

The return of a decade-old attack vector, the malicious macro, requires a granular, policy-based approach to managing email at the gateway, says Greg Sim.

Keep your friends close... but your insiders closer

Keep your friends close... but your insiders closer

A well-defined security programme focused around the company's most critical data, combining technology and education powered by metrics, will help businesses reduce insider risk levels says Neil Thacker.

Russia updates its IT security strategy in reaction to current tensions

Russia updates its IT security strategy in reaction to current tensions

Russia says it is revising its policies to help prevent information warfare, identity-theft and cyber-fraud.

Russian/Chinese cyber-security pact raises concerns

Russian/Chinese cyber-security pact raises concerns

By

News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

NATO members to get cyber war protection

NATO members to get cyber war protection

By

Nato cyber defence policy to declare that a cyber attack on any one member country is an attack on them all.

Know thy neighbour: Dealing with third-party cyber attacks

Know thy neighbour: Dealing with third-party cyber attacks

It's not enough to protect your own network, you also have to be prepared to cope with third party negligence, says Brian Foster.

MP says National Security Strategy must take cyber threat seriously

MP says National Security Strategy must take cyber threat seriously

By

Dame Margaret Beckett has criticised the government's National Security Strategy and says that the next version must do more to protect businesses from cyber threats.

Why driverless cars demand new rules of the road

Why driverless cars demand new rules of the road

There's issues around the big data emitted by driverless cars, security issues related to control of the cars, but it's the 'governance framework' that needs to be put in place first suggests Raimund Genes.

The inherent security risks of temporary staff

The inherent security risks of temporary staff

The rise in casual and contract workers has been accompanied by a rise in employee fraud leading Ching Liu to suggest that this temporary solution could create a permanent problem for many businesses.

Analyst says insider threat mainly down to lack of understanding

Analyst says insider threat mainly down to lack of understanding

By

"Privileged user management is central to enforcing security policies" says Bob Tarzey, analyst at Quocirca.

Context is king

Context is king

Context-aware security can make intelligent decisions while allowing mobile users to get the job done.

BYOD: Facing up to the inevitable

BYOD: Facing up to the inevitable

Businesses can accept employee device promiscuity without causing difficulties for IT management, says Centrify's Darren Gross.

Get your BYOD policies wrapped up by Christmas

Many more personal mobile devices will arrive in the office after Chrismas, so sort out your security policies now advises Leon Ward.

UK bets big on enterprise mobility, but security and privacy concerns remain

UK bets big on enterprise mobility, but security and privacy concerns remain

Enterprise mobility adoption is on the upswing in the UK and Europe, but serious concerns linger on security and privacy.

Companies fail to manage BYOD

By

Only 27 per cent of organisations surveyed globally have well-defined network BYOD policies in place according to new research from Dimension Data.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US