Data masking: anonymization or pseudonymization?

Among the arsenal of IT security techniques available, pseudonymization or anonymization is highly recommended by the GDPR regulation.  Such techniques reduce risk and assist “data processors” in fulfilling their data compliance regulations. If it can be proven that the true identity of the individual cannot be derived from anonymized data, then this data is exempt […]

Insider Threat: 74% of security incidents come from the extended enterprise, not hacking groups

New research by leading data security company, Clearswift, has shown that year on year cyber security incidents, particularly insider threats; continue to rise, but that companies are able to spot suspicious activity significantly quicker than two years previous. The research, which surveyed 600 senior business decision makers and 1,200 employees across the UK, US, Germany […]

Private and unconfidential business need to go back to basics to protect against cyber threats

British businesses are running the risk of being hacked and having confidential data leaked, due to a laissez-faire attitude towards digital security. The news comes at a time when cyber threats are at an all-time high, GDPR legislation is coming, and businesses are exposing themselves to significant fines and risk reputational damage as a result. […]

Make do or mend? The realities of why organisations can’t ‘just’ patch   

The issue of security patching has come to the forefront of cyber security discussions more than ever in recent months. We know that out-of-date software, systems and servers are prime targets for attackers armed with exploits. May’s WannaCry attack exploited a Windows vulnerability, and although Microsoft had already released a security patch months earlier to protect […]

What Is the Next WannaCry?

When ransomware attacks like the recent WannaCry and NotPetya happened, suddenly IT security became a top priority within organisations.  Why these attacks are headlines news? Because, the companies were not prepared. This triggered a question within the stakeholders will there be more attacks? Anytime such an attack occurs, there will be plenty of experts happy […]