Action Plan for Small Enterprises

In my last blog we created a security baseline to help organizations adequately protect sensitive data.  While this series has been focused on guidance for smaller companies,  the basic principles can be applied to any organizations.  The key difference is that smaller companies will be under pressure to spend on compliance and their secrets which…

Creating a Baseline for Small Business

In my last blog ‘To Cybercriminals, The Size of a Company No Longer Matters” I discussed the fact that the latest PwC Information Security Breaches Survey 2013 shows that there has been a significant rise in the number of small businesses that were attacked by an unauthorized outsider in the last year – up by…

To Cybercriminals, The Size of a Company No Longer Matters

Gone are the days when it was thought that size of the company matters to the cybercriminals.  The latest PwC Information Security Breaches Survey 2013 shows that there has been a significant rise in the number of small businesses that were attacked by an unauthorized outsider in the last year – up by 22%.  Interestingly…

Where has the £650 million gone?

The UK government has identified cyber security as a key area of focus and new investment and in 2011 announced a budget of £650 million to shore up defenses in the UK.  So after two years, let’s examine how it’s been spent. Here’s some of the good things that have resulted from the investment SOCA…

Disruptive technologies breaking down our doors in 2013

RSA recently launched its latest SBIC report titled ‘Information Security Shake-up – Disruptive Innovations to test Security’s Mettle in 2013’. It introduces some interesting food for thought on what organizations should have on their ‘to do ‘list for 2013. Four key innovations are highlighted which shouldn’t come as a big surprise to anyone, I think…

BYOD Are We Still Not Getting It Right?

Continuing on my recent blogs on BYOD, I thought I would share some interesting statistics from this year’s PwC Information Security Breaches Survey. 75% of large businesses allow staff to use smart phones and tablets to connect to their systems yet only 39% ensure that data on these smart phones is encrypted. Mobile devices are…

Where’s my Data?

According to a recent report by Icomm Technologies, 70% of cloud data centers keep customers in the dark about storage locations. To me that is a pretty scary statistic particularly as organizations are rapidly deploying cloud storage services and there doesn’t seem to be any evidence that organizations that have sensitive or confidential data are…

BYOD Checklist Part 2

Here’s the second installment for the BYOD checklist as promised : Ensure end-users are responsible for backing up personal data Clarify lines of responsibility for device maintenance, support and costs Require employees to remove apps at the request of the organization Establish that the company will disable a device’s access to the network if a…

Risk and Reward See-Saw for Mobile

At RSA Conference Europe recently, the latest report from the Security for Business Innovation Council was launched entitled ‘Realizing the Mobile Enterprise’. It is really about balancing the risk and rewards for mobile devices and incorporating them in the overall enterprise Security strategy. BYOD is not a new concept and most organizations today have some…

Big Data Security Analytics – Where do you Start?

In my recent blog series, ‘learning to cook ’, I created the recipes required for protecting against Advanced Threats. Big data analytics plays a key role in this as we really need to collect all of the data in our environment. So ,where do we start with analyzing this data ? I see it as…