What Can An Allegedly Dumb Facebook-Using Thief Tell Us About Security?
When it comes to securing computers, networks and information you may think that there isn’t much to it. In some respects, you would be quite right too (though the level of training and expertise required to be competent in this area most definitely shouldn’t be underestimated). After all, computers are logical devices and you typically […]
Security Incidents – Don't Forget Your Business Competitors
If you run any kind of business these days then there is a very good chance that you utilise the internet in some way to aid the accomplishment of your corporate objectives. Because of this you should be aware that there are risks inherent with using the web, especially now that stories about data breaches are […]
My first Information Security Conference – SOURCE Conference: Dublin 2014
I attended the two day SOURCE Conference at the Trinity College in Dublin last week (22-23 May), and have now officially stepped into the big bad (read awesome) world of Information Security with this being my first InfoSec conference. (Exciting times ahead!) Launched in 2008 in Boston, Massachusetts (USA) the SOURCE Conference focuses on bridging […]
More Than 1 in 8 IT Security Pros Can Access Previous Employers’ Systems Using Old Credentials
A survey conducted by Liberman Software at the 2014 RSA Conference in San Francisco has revealed that just over 13% of IT security professionals admit that they are still able to access previous employers’ systems by using their old credentials. The survey queried 280 IT security professionals, of which 55% worked in organisations employing over […]
Are Passwords Being Shared Within Your Organisation?
One security topic that I’ve heard and written a fair bit about recently is that of the password. Its been the primary means of access control for as long as I can remember and its served its purpose reasonably well for much of that time. But it isn’t a perfect solution for protecting computers and […]
Easy To Guess Passwords Have No Place In Your Organisation
Whilst the computers and networks within an organisation undoubtedly need protecting, the weakest point in any security setup can often turn out to be the people who use the system. If you have responsibility for running a network then the amount of technology you employ to protect it will be of little consequence if users […]
Privileged User Abuse: The Human Factor
If you keep up with the news then there is a very good chance that recent data breach reports may leave you feeling that the biggest risk to your organisation is external, coming from hackers, hacktivists and maybe even intelligence agencies. But you shouldn’t forget that some risks are closer at hand. Internal threats can […]
You’ve Been Breached. Now What? – Webinar, June 5th – 2pm BST
I will be taking part in a webinar next week hosted by Infosecurity Magazine on You’ve Been Breached. Now What? Here are the details of the event The headlines are full of stories of breach, and information security professionals are beginning to accept that security breaches are a ‘when?’, not an ‘if’. According to Verizon’s […]
Ebay Auction Site Breached – Your Data Going, Going, Gone
The popular online auction website announced today that its systems had been breached by attackers exposing “ eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth.” The press release reassures users that “the database did not contain financial information or other confidential personal information” The breach appears to have happened sometime in February or […]
Google Boosts App Security To Protect Customer Data From Unauthorised Access
Google takes its responsibility of keeping business customer data very seriously according to a blog post from Amit Singh, President of Google Enterprise. As a result, the company has announced a raft of security changes which it hopes will further protect its customers from a variety of different types of unauthorised access. The new features […]