Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.

Source: 2017 Trustwave Global Security Report

The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on

Recovering from the PetyaWrap Ransomware Attack & Preparing for Whatever’s Next

As the saying goes, “Fool me once…”

Businesses that fail to secure their networks from known exploits will continue to be targeted by malware attacks. Yesterday, those who didn’t learn this lesson during the recent WannaCry fiasco got a malicious reminder to regularly update network security and patch their OS.… Read on

Yes, the GDPR Applies to your Company

Companies Aren’t Ready for the GDPR

During a recent group webinar with infosecurity-magazine.com (you can watch the full recording of that here), we asked 200 IT professionals to rate their organizations’ preparedness for GDPR. These were their responses:

  • 17% – Very prepared
  • 13% – Almost ready
  • 40% – We’ve got a long way to go
  • 30% – I don’t think we’ve done a thing

With less than a year before it takes effect, 70% of organizations surveyed are not even close to being ready for the GDPR.… Read on

Remote Access and GDPR Part 3: The Impact of Requiring Consent

Quick, what is the most boring thing you can think of?

  • Sitting in traffic
  • Any company meeting that involves PowerPoint
  • Watching professional golf (that can’t just be me?)
  • Discussions of the role Consent plays in applying EU General Data Protection Regulations to the use of remote access and remote control software

I doubt the topic of GDPR Consent and remote access software was on your list.… Read on

Remote Access and GDPR Part 2: Pseudonymization and Encryption

The pseudonymisation and encryption of personal data is required by the GDPR, but before we dive into this, ask yourself: how confident am I in my understanding of these terms? Even seasoned IT professionals struggle with these – especially when spelling and pronouncing them.… Read on