Only a third of British businesses have a financial plan in place in case of a cyber-attack. Research from Lloyds Bank reveals only half of companies contemplate the risks of a cyber-attack at board level.
Even if you're not a victim now, the chances are that your information will be compromised in the future. Therefore, preparation is key for the moment our identity is stolen.
In a month from now, the UK will welcome GDPR which will give the ICO more powers to defend consumer interests and issue fines of up to £17 million or four percent of global turnover on organisations in the event of data breaches.
How can firms foster technological innovation while upholding a rigorous cyber-defence strategy? Problems can arise when companies run head first into innovation without considering potential risks.
Historically, IT Directors & CIOs were focused on operational activities: keeping the lights on, keeping risk low, keeping systems running. Today we are seeing a necessary transition of the role, from functional CIO to strategic CIO.
Recognising the problem and putting a plan and strategy in place on how you're going to tackle it is the essential first step.
If your business has an online presence or internet-facing network infrastructure, you really need to understand the significant threat posed by DDoS attacks today and put measures in place now to mitigate them.
In spite of the prevalence of cyber-threats facing every business sector, a survey has found that two thirds of businesses do not have a financial plan in place in the event of a cyber attack.
Use the lessons learned from past attacks, ensure security is a high priority in the organisation and train staff appropriately, plus source solutions that are both reputable, transparent and independently audited.
There is a general lack of understanding amongst IT professionals regarding exactly what they needed to change in everyday processes to achieve regulatory compliance (under GDPR).
There are some difficult obstacles to overcome in the cyber-security tough-mudder challenge, from ransomware and phishing to insider threats and GDPR, but thorough preparation can boost your chances of success.
The prospect of a cyber-attack on any organisation can be very daunting. However, if you have the processes, contacts and a strong response plan at the ready, the situation can be dealt with much more effectively.
IT and security leaders must elevate IAM out of the realm of IT, via a programme management approach, so it becomes a business-wide initiative; IAM leaders need to assert themselves in digital transformation initiatives.
The key to achieving 'pay as you grow' security is to move away from traditional rigid security product models tied into the infrastructure by embracing an overlay approach that decouples security from the connectivity infrastructure.
The opening ceremony for the Pyeongchang Winter Olympics in South Korea is still a month away, but cyber-criminals have already started using it as part of their social engineering plans in several phishing attacks.
Truly resilient IT plans combine security and recovery so in the event an attack does infiltrate the firewall, it is critical that organisations have a plan that allows for rapid recovery and business operations as usual as quickly as possible.
Several NATO members are contemplating a change in the alliance's doctrine regarding how it might react to future cyber-attacks, possibly enabling a more robust response.
The UK Chancellor Philip Hammond, announced his autumn budget today, and while it was a pro-tech budget, he had nothing to say specifically about cyber-security, hence the industry has had a lot to say about his plans.
Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.
All organisations based at least partially online and handling data across the EU must comply with the new GDPR rules yet 69 percent of UK businesses are not ready. Being unprepared is dangerous warns Dr Jamie Graves.
Kinetic attacks have come off the movie screen and into reality, and you are likely to be vulnerable - if not directly, then via collateral damage if CNI is hit - so include the possibility on your risk register and prepare says Graeme Park.
When Clapham Junction train station ejected everyone after being overwhelmed by an unexpected event last week the problem became one of resilience - and the impact of pre-planning came to the fore.
In instalment two of his four-part viewpoint series, Tony Collings outlines the design and development phase of the project - the key challenge: getting the solution right.
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?
Wolfgang Kandek notes that a key concern for countries securing critical infrastructure is ensuring legislation compliance doesn't limit flexibility, and asks if new German laws might provide a benchmark.