Search Results for: data breach

Companies overlooking cost of cyber risks as variety and number of breaches increase

Companies are overlooking cost of cyber risks as incidents of breaches riseCyber risk is becoming increasingly common while the types of breaches are becoming more diverse, claims a new white paper by the audit and accounting expert BDO. For instance, ransomware is now the fifth most common type of malware; with the cost of freeing up computer systems from ransomware tripling since 2016. Yet organisations are continuing to spend up to four times more on insuring other company assets (e.g. property, equipment etc.) than on cyber insurance, despite an increasingly widespread belief that their cyber assets are in fact up to 14 percent more valuable. The report also finds that as cyber incidents increase, they become more difficult – and therefore more expensive – to defend. In the new cyber insurance white paper, BDO’s global cybersecurity leadership group stresses the importance of businesses gaining an understanding of their unique risk profiles in order to ensure the right cyber insurance for their needs. Cyber insurance: managing the risk does include some of the positive trends around cyber security – for example, both the level of Board involvement and investments in cybersecurity have increased significantly in the last 2-3 years.

More →

New data protection legislation will lead to increased demand for specialist staff

New data protection legislation will lead to increased demand for specialist staff

New data protection legislation – due to come into force next year will lead to a boost in recruitment, claims new research from Robert Half UK.  Two-thirds (66 percent) of CIOs say they will hire additional, permanent employees to cope with the introduction of the EU’s General Data Protection Regulation (GDPR). The new data protection legislation will reshape the way organisations approach data privacy, providing the public with more visibility into data breaches. As organisations concentrate on compliance initiatives, demand for permanent project managers (33 percent), business analysts (26 percent) and data protection officers (26 percent) that oversee how data is processed, will increase. A further 64 percent of CIOs will hire temporary or interim staff to ensure they have the highly-skilled talent in place to manage the change in data management and reporting. The type of role that businesses are recruiting for with GDPR will vary according to company size. Overall, 16 percent of SMBs see GDPR as a concern, compared to 12 percent of large business. SMBs are more likely to hire project managers (32 percent) to help with compliance while larger organisations are placing a greater focus on recruiting data protection officers (33 percent).

More →

Bored and distracted employees are biggest data security risk

Bored and distracted employees are biggest data security risk 0

Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a snapshot poll conducted by Centrify at Infosec Europe in London this week. While more than a third of survey respondents cite distraction and boredom as the main cause of human error, other causes include heavy workloads, excessive policies and compliance regulations, social media and password sharing. Poor management is also highlighted by 11 percent of security professionals, while 8 per cent believe human error is caused by not recognising their data security responsibilities at work.

More →

Apathy, laxity and ineptitude continue to dog data security issues

Apathy, laxity and ineptitude continue to dog data security issues 0

WhateverHow firms must hanker for the days when the issue of corporate data security could usually be addressed simply by asking what somebody had in their bag when they left the building or were fired. Amongst other things, the practice of Bring Your Own Device (BYOD) means that the ways for data to leak out of the organisation are now numerous, if not generally malicious. A new cluster of reports has emerged that highlight how carelessness, indifference, cultural ineptitude and the complexities of unmanaged, privately owned technology make it increasingly difficult for firms to maintain the security of their data. While some of the sources of this leakage are generally well known, a couple that are not generally acknowledged is the apathy of employees when it comes to keeping work files safe and secure and the lax attitude of employers when breaches occur.

More →

New report urges firms to protect against BYOD security breaches

BYOD securityAccording to a new report from BT, security breaches related to the practice of Bring Your Own Device (BYOD) and related forms of mobile working have affected 41 percent of UK organisations over the last year. Despite this, the report claims organisations are still not taking sufficient measures to protect themselves against threats such as lost or stolen devices and malware infections. The report reveals that at least one fifth of respondents’ organisations that suffered a mobile security breach, experienced more than four incidents in the last year. The research is based on a total of 640 interviews with IT decision makers from large sized organisations (1000 or more employees) across 11 regions: Australia, Brazil, France, Germany, Hong Kong, Middle East, Singapore, Spain, South Africa, UK and USA. Respondents’ organisations were from the financial, retail and public sectors. It shows that uptake of BYOD (Bring Your Own Device) and COPE (Corporately Owned Personally-Enabled) devices is very high, with 95 percent of UK organisations allowing employees to use these devices for work purposes.

More →

IT and HR failing to work together to tackle computer data risks

IT and HR failing to work together to tackle computer data risks The inability of employees to follow computer access policies is the greatest threat to an organization’s data security, just slightly ahead of professional hackers. Yet, as a new report reveals, the majority of IT managers still believe it is ‘easy’ to protect their organisation’s security and defences against a data breach. The research, commissioned by Courion, found that 43 percent of respondents felt they could have better relations with Human Resources in managing staff access rights, with a majority (59 percent) not feeling confident they had enough help to make dealing with insider threats easier.  This follows a recent separate study into staff attitudes to IT security that found staff could be ambivalent about how they use their access rights – for example, 39 percent share work login details with colleagues and 1 in 5 of UK professionals said they would snoop on sensitive personal data if they had access to it.

More →

It’s not all about BYOD; data security also remains a low-tech issue

Oliver Letwin dumps government secretsWhile firms worry about the loss of data through the practice of BYOD, employees continue to find low tech ways of breaching security according to a report from Iron Mountain. While under half (42 percent) of employees describe their organisation’s approach to hard copy as secure, one in ten describe it as chaotic. Nearly half claim to have seen confidential information lying around in the usual places such as on desks or photocopiers. The most common types of information exposed in this way are details of salaries and performance reviews as well as commercial and financial data, although many will remember the scandal that broke two years ago when Government minister Oliver Letwin (above) repeatedly dumped classified information in a park bin including some about Al Qaeda, Libya, Afghanistan, the Dalai Lama and Aung San Suu Kyi.

More →

Third of Europe’s large firms have already lost data through BYOD

gordian_knotBring Your Own Device remains the Gordian Knot of workplace technology. While firms have tried to label and co-opt the unstoppable propensity of employees to use their own devices for work as a way of cutting the business’s technology costs, they are paying in other ways. As we reported last week many remain unaware of the extent of the practice and of its potential to clash with company policy. Now, the full extent of the inevitable security breach inherent in either sanctioned or unsanctioned use of personal technology is becoming evident. According to a new report from Samsung, around a third of Europe’s largest companies have lost company and confidential data through the practice.

More →

Three quarters of companies allow BYOD, but most admit data security concerns

Three quarters of companies allow BYOD

In the same week that Apple launches the iPhone 5S, over half (56%) of CIOs have said they allow employees to use their own smartphones in the workplace, and over three quarters (76%) of staff are allowed to use their own mobile data devices. While the research from Robert Half Technology found the biggest BYOD challenge is security, cited by over half (53%) of respondents, the Verizon 2013 Data Breach Investigations Report into global data breaches provides some reassurance that 86 per cent of cyber-attacks do not knowingly involve insiders. However lax internal practices, like copying data onto a USB drive or leaving a device in a cab does lead to security breaches, accounting for 41 per cent of cases of misuse. More →

Technology and talent should be main focus for business leaders now

Technology and talent should be main focus for business leaders now

Technology and talentBusinesses are investing in technology to expand online operations and facilitate remote work during the pandemic. But many of those same businesses are also eager to see their employees return to the workplace in greater numbers over the long term. Those are among the findings of a new survey of small and midsized business leaders conducted by The Harris Poll and sponsored by CIT, a division of First Citizens Bank.  More →

Security careers come in many forms, but all are rewarding and challenging

Security careers come in many forms, but all are rewarding and challenging

security careersAre you considering a change in career paths? One sector that you may wish to strongly consider is the security industry. Whether a retail store, office block, or nightlife venue, most businesses will usually require security personnel. Therefore, this is an industry where there is always demand for new staff. Working in security careers can be thrilling, challenging and rewarding. There should be no doubting the fact that every day offers something completely different. Choosing a job that suits you is no simple decision with several different security career paths that you can go down.
More →

Firms should be aware of the legal implications of employee monitoring

Firms should be aware of the legal implications of employee monitoring

employee monitoringEmployee monitoring is an emotive topic. Businesses may wish to monitor their staff for a variety of reasons. For instance, they may wish to prevent the unauthorised disclosure of confidential or sensitive information, or detect attempts to steal valuable intellectual property. In the current conditions, dominated by the coronavirus pandemic, many businesses have opted to use automated means to monitor staff productivity. However, from an employee’s perspective, the use of monitoring software may be intrusive if not distressing. Further, if it has been implemented without regard to data protection law, it is potentially illegal. More →