Virgin Media and Not-Quite-Best-Practice Incident Reporting

Posted by:

Virgin Media, a UK telephone, cable TV and internet services provider released a statement two weeks ago admitting that they had exposed certain personal data of up to 900,000 people.

The short story is that they admitted it, they apologized, they informed both the affected people and the relevant authorities, and they set up a help and advice page for customers.

Great stuff, except…

While ...

Read More →
0

Coronavirus And The Sudden Remote Worker Cybersecurity Problem – 5 Things to Consider

Posted by:

While the Covid-19 situation is changing rapidly, companies need to prepare for any eventuality. For IT departments, this means that, at any moment, any number of staff might be required to stay at home for a period of quarantine or self-isolation at very short notice. 

Where appropriate, companies ought to consider how they can keep their employees productive if they can’t come into work for a few weeks. 

In many cases, a remote working setup might ...

Read More →
0

Backup Strategy in six points (and a free mnemonic)

Posted by:

Good backup strategy = a better night’s sleep. It’s as simple as that.  It’s also difficult to get right and needs constant tweaking, not just because the amount of data we’re producing is growing exponentially, but also because the options for quick, secure backup are increasing, and that’s a very good thing!

Conversely, bad backup strategy is worse than useless as you can pay a lot of money for a big bag of false hope.

Why ...

Read More →
0

Assessing your risk in the New Year

Posted by:

This is the season for look-backs and look-forwards to what is/was big in every aspect of life and business. Cybersecurity features heavily in these articles, naturally, because effective cybersecurity can the thin line between chaos and order in a world that relies ever increasingly on computer systems and the internet.

I’m not going to rehash these various lists for you. I will however give a few examples to show that the key to effective cybersecurity is not ...

Read More →
0

(Internet of) Things Change, and Not Always for the Better

Posted by:

I was chatting with one of my IT Admin friends the other day. Let’s call him Gary to spare him blushes. He has been working in offices for years, and I asked him what little things annoy him these days. Not the Big Stuff like ransomware and corporate spying, I just wanted to know about the day-to-day frustrations.

He said:

 “When I started out as ‘The IT Guy’ in the office, people would come and ask ...

Read More →
2

Security Benefits and Perils of Serverless Computing

Posted by:

Whether you run your infrastructure in house or in the cloud, you’ve probably heard of serverless computing, and how it can make running applications easier and cheaper.  But is it all it’s cracked up to be, and is it more secure than running ‘always on’ servers?

Let’s start with the obvious advantages:

No infrastructure to maintain, not even virtual

With serverless computing, you don’t have to worry about provisioning servers, not even virtual ones. Your code runs ...

Read More →
0

How to evidence your way thru compliance

Posted by:

I’m not usually a fan of nouns being used as verbs.  As Calvin said to Hobbes in Bill Watterson’s wonderful comic strip, “Verbing weirds language”.

I mean, who really ‘dialogues’ with colleagues, or  ‘greenlights’ tasks for them to ‘action’? 

But there’s one denominal verb https://en.wikipedia.org/wiki/Denominal_verb (yes of course there’s a word for it) which I find myself using, and that is ‘evidencing’. This is a wonderfully concise way of saying “proving ...

Read More →
0

Why it is high time to consider a CISO on demand

Posted by:

Many years ago I went to the doctor with a weird arm.  If I held my elbow and wrist just-so, it seemed to stop the blood supply going to my fingers.  Nothing too dramatic, but worth getting checked out. I was referred to the local hospital where the specialist remarked that he had never seen anything like it and he was keen to investigate further.

“I should add that you’ve been referred to the wrong department.  This ...

Read More →
0

Isn’t it time we talk seriously about a nation-wide Privacy Act?

Posted by:

Would you be surprised if someone told you that they felt even less secure online today, compared to five years ago? 

All we hear about are big companies screwing up and losing user data

Nah. Me neither. As reports Mitchell Noordyke from iapp, “state level momentum for comprehensive privacy bills is at an all time high. 

One of the hot topics now is whether the United States, Like the EU, ...

Read More →
0

How to avoid nasty flies in your bug bounty program

Posted by:

Bug bounties are increasing in popularity, but are there any steps to consider to ensure you keep any annoying flies at bay? Let’s take a quick look.  

Late last week, Google told security researchers that they have upped the bug bounty reward, making it significantly more attractive for researchers to invest in bug hunting.

Media reports cite that Google has received more than 8,500 security bug reports since the launch of its Chrome Vulnerability Rewards ...

Read More →
0
Page 1 of 11 12345...»
})
SEC Cybersecurity Exams