Planning News, Articles and Updates

What will it take for the C-suite to care about cyber-threats?

Only a third of British businesses have a financial plan in place in case of a cyber-attack. Research from Lloyds Bank reveals only half of companies contemplate the risks of a cyber-attack at board level.

Identity theft: the aftermath and what to do next

Even if you're not a victim now, the chances are that your information will be compromised in the future. Therefore, preparation is key for the moment our identity is stolen.

43% businesses, 19% of charities hit by data breaches: Cyber Breach survey

In a month from now, the UK will welcome GDPR which will give the ICO more powers to defend consumer interests and issue fines of up to £17 million or four percent of global turnover on organisations in the event of data breaches.

Cyber-security: no longer an afterthought

How can firms foster technological innovation while upholding a rigorous cyber-defence strategy? Problems can arise when companies run head first into innovation without considering potential risks.

The cyber-accountable Chief Information Officer (CIO) - a strategic role

Historically, IT Directors & CIOs were focused on operational activities: keeping the lights on, keeping risk low, keeping systems running. Today we are seeing a necessary transition of the role, from functional CIO to strategic CIO.

The information security skills shortage and how to solve it

Recognising the problem and putting a plan and strategy in place on how you're going to tackle it is the essential first step.

Counting the costs of DDoS attacks - prepare in advance

If your business has an online presence or internet-facing network infrastructure, you really need to understand the significant threat posed by DDoS attacks today and put measures in place now to mitigate them.

UK businesses financially unprepared for cyber-attacks

In spite of the prevalence of cyber-threats facing every business sector, a survey has found that two thirds of businesses do not have a financial plan in place in the event of a cyber attack.

Build security into the fabric of your organisation

Use the lessons learned from past attacks, ensure security is a high priority in the organisation and train staff appropriately, plus source solutions that are both reputable, transparent and independently audited.

Confusion reigns as GDPR deadline looms - but it's not too late to act

There is a general lack of understanding amongst IT professionals regarding exactly what they needed to change in everyday processes to achieve regulatory compliance (under GDPR).

Is your company a cyber-security 'Tough Mudder?'

There are some difficult obstacles to overcome in the cyber-security tough-mudder challenge, from ransomware and phishing to insider threats and GDPR, but thorough preparation can boost your chances of success.

A step through guide on how to mitigate a cyber-attack

The prospect of a cyber-attack on any organisation can be very daunting. However, if you have the processes, contacts and a strong response plan at the ready, the situation can be dealt with much more effectively.

Organisations should push identity and access management up the business agenda

IT and security leaders must elevate IAM out of the realm of IT, via a programme management approach, so it becomes a business-wide initiative; IAM leaders need to assert themselves in digital transformation initiatives.

Secure digital transformation - separate security from infrastructure

The key to achieving 'pay as you grow' security is to move away from traditional rigid security product models tied into the infrastructure by embracing an overlay approach that decouples security from the connectivity infrastructure.

2018 Winter Olympics being used as phishing attack bait

The opening ceremony for the Pyeongchang Winter Olympics in South Korea is still a month away, but cyber-criminals have already started using it as part of their social engineering plans in several phishing attacks.

The key to IT resiliency: security and disaster recovery working together

Truly resilient IT plans combine security and recovery so in the event an attack does infiltrate the firewall, it is critical that organisations have a plan that allows for rapid recovery and business operations as usual as quickly as possible.

NATO drawing up cyber counterattack contingency plans

Several NATO members are contemplating a change in the alliance's doctrine regarding how it might react to future cyber-attacks, possibly enabling a more robust response.

Budget: tech & skills investment welcome, why no mention of cyber-security?

The UK Chancellor Philip Hammond, announced his autumn budget today, and while it was a pro-tech budget, he had nothing to say specifically about cyber-security, hence the industry has had a lot to say about his plans.

Collaboration is the key to driving IoT security innovation

Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.

Crunch time for GDPR - how to prepare. Eight steps to compliance.

All organisations based at least partially online and handling data across the EU must comply with the new GDPR rules yet 69 percent of UK businesses are not ready. Being unprepared is dangerous warns Dr Jamie Graves.

Friend or foe?: Which of your networked devices might turn on you?

Kinetic attacks have come off the movie screen and into reality, and you are likely to be vulnerable - if not directly, then via collateral damage if CNI is hit - so include the possibility on your risk register and prepare says Graeme Park.

Clapham Junction incident - a model for disaster recovery? Not without practice

When Clapham Junction train station ejected everyone after being overwhelmed by an unexpected event last week the problem became one of resilience - and the impact of pre-planning came to the fore.

Video: Building blocks of IT security 2 - Design and development

In instalment two of his four-part viewpoint series, Tony Collings outlines the design and development phase of the project - the key challenge: getting the solution right.

Video: Building blocks of IT security 1 - Establishing the requirement

In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?

Germany's approach to securing critical infrastructure - a benchmark for others?

Wolfgang Kandek notes that a key concern for countries securing critical infrastructure is ensuring legislation compliance doesn't limit flexibility, and asks if new German laws might provide a benchmark.