Bad passwords and weak security are making ships an easy target for hackers

Commercial shipping vessels have such poor cyber security it’s possible to track them down and hack into them via poorly secured communications systems. Ken Munro, a security researcher at Pen Test Partners, who has documented the lapses in security said they are “simply not acceptable”. Read about the new report by Ken Munro, a security researcher at […]

Beazley publishes special US healthcare data breach insights report

Timed to coincide with the 2017 American Society of Healthcare Risk Management (ASHRM) conference, leading specialist insurer Beazley has today published a special data breach report for the US healthcare sector. Read the new US healthcare data breach insights report by Beazley which reveals that unintended disclosure accounted for 41% of data breach incidents reported to […]

Cyber security top concern for corporate IoT deployments: BlackBerry

Cyber security is the top concern regarding digital technologies and processes for firms globally (63 per cent) but only a few (37 per cent) actually have a formal digital transformation strategy in place when it comes to Internet of Things (IoT) deployments, new research said on Tuesday. Read about the new research by BlackBerry which […]

33% of businesses hit by DDoS attack in 2017, double that of 2016

Cybercriminals are increasingly turning to Distributed Denial of Service (DDoS) this year, as 33% of organizations faced such an attack in 2017—up from just 17% in 2016, according to a new report from Kaspersky Lab. Read about the new report by Kaspersky Lab which reveals that 33% of organizations faced such an attack in 2017—up from […]

MI5 chief warns of ‘intense’ terror threat to the UK

The UK has already suffered five terror attacks this year, and the head of MI5 says the security challenge is only becoming more intense. According to Andrew Parker, terrorist activity aimed at the UK is increasing, and it’s becoming more difficult to detect dangerous plots. Read more about the ‘intense’ terror threat facing the UK […]

Beware of political instability around the globe, says XL Catlin

Political instability in countries as diverse as the Democratic Republic of Congo, Mexico, and Spain could pose significant risks to global businesses, says XL Caitlin’s head of emerging markets. Brendan Plessis advises businesses to be more proactive about monitoring developments, developing contingency plans, and strengthening relationships with local decision makers. Read more about managing political […]

Physical security strategies: When to confront an active shooter and when to hide

Many security experts will tell you to run and hide if an active shooter gains access to your workplace or school. At least some security experts have now changed their approach, saying reactions should be contingent on the specific situation. In some cases, confronting the shooter may be the best strategic move. Read more about […]

Realistic Cybersecurity for Small- and Mid-Sized Enterprises

Read Pamela Passman’s about a realistic approach to cyber security for small and medium sized enterprises on Brink : In June of this year, a data analytics firm working for the Republican National Committee left databases of 198 million U.S. citizen voter files exposed to the Internet without security, making the RNC susceptible to theft by […]

More than half of businesses fell victim to DDoS attacks in the past year, survey shows

More than half of businesses (54%) have been victims of successful distributed denial of service (DDoS) attacks over the past 12 months, according to research from cloud security firm CDNetworks. Read about the new report by CDNetworks which reveals that more than half of businesses worldwide have fallen victim to a successful distributed denial of service […]

Acting on the cyber executive order: 3 keys to compliance

Read hawn Campbell’s article about the 3 keys to compliance to the new cyber security Executive Order on FCW : Nearly six months after President Donald Trump issued his Executive Order on Strengthening the Cybersecurity of Federal Networks And Critical Infrastructure, actual implementation is getting underway. Read his full article here.