Archive for the ‘IT Security’ Category

The word “cyber-criminal” conjures up a picture of a computer nerd, sitting alone in their basement, iterating through passwords in an attempt to gain access to some top-secret files. However, these days, the reality is that many “cyber-criminals” are actually just automated bots seeking vulnerable systems to exploit. If we are to tackle the issue of cyber-crime, we need automated solutions in order to stay ahead of the game. As … Read more

Recent surveys carried out by the Ponemon Institute and Juniper Networks have found that 65% of organizations lack adequate numbers of security staff to deal with cyber-attacks. The survey suggests that part of the reason why this is the case could be attributed to a lack of security talent on offer and a lack of security training provided by organizations. Unfortunately, the same survey states that this lack of security … Read more

Back in the day, all CISOs needed to do to get their cybersecurity budgets approved was to intentionally confuse the rest of the C-suite by using overly-complex technical language and showing pretty infographics with lots of red. More often than not, fear was used as a tactic to justify spending money on cybersecurity solutions. This evolved over the years as new regulatory bodies introduced standards that made cybersecurity a box-ticking … Read more

According to research carried out by NetDiligence – a cyber risk assessment and data breach services company – Healthcare and Professional Services were the most breached sectors. The healthcare industry accounted for 18% of all breaches, with an average cost of $717K per breach. 63% of these breaches were the result of “criminal or malicious activity”, with hacking being the most common cause of data loss (20%). Ransomware attacks continue … Read more

The discussion about whether or not private blockchains can be used to protect sensitive data is a complex one, and I’m by no means an expert. The term “blockchain” has become one of those industry buzzwords, yet despite all the hype surrounding the technology, most enterprises are still not sure how to use it to their advantage. I’d like to start by asking a few simple questions… Firstly, will using … Read more

This month is the 14th National Cyber Security Awareness Month (NCSAM) in the USA. The NCSAM began as part of a joint campaign by the National Cyber Security Alliance and the US Department of Homeland Security to help bring to light key issues in the cybersecurity space. This year the focus has been on the continued role and responsibility that organizations have to secure customer and employee data – a … Read more

Visibility is, and has always been, the key to protecting sensitive data. If you don’t know exactly who, what, where and when, your sensitive data is accessed, modified, moved or deleted, there’s simply no way you can keep this data out of the wrong hands. Of course, gaining such visibility is easier said than done, and requires the right tools, policies and procedures. Below is a summary of the 5 … Read more

Due to the large number of users, and the large amounts of valuable data they store, educational institutions remain a prime target for cyber-criminals. According to a survey carried out by VMware, “one in three universities in the UK face cyber-attacks on an hourly basis,” and according to a report by the Information Commissioner’s Office’s (ICO), the education sector has seen a 32% increase in reported incidents since 2016. What … Read more

The financial services industry remains a prime target for cyber-crime. According to an article by The Telegraph, in 2016, consumers of financial services lost an estimated £8bn due to cyber-attacks. Now, with the GDPR in full swing, financial institutions are under even more pressure to tighten up their security posture. After all, a data breach could potentially lead to fines of up to €20 million or 4% of global turnover, … Read more

The healthcare industry continues to be plagued by cyber-attacks. So far in 2018, 1.4M records were breached in a phishing attack on UnityPoint Health. 38,000 patient records at were stolen from Legacy Health, and a data breach was disclosed involving 417,000 patient records from Augusta University. This is just the tip of the iceberg. Medical records remain as lucrative as ever – selling for as much a $50 per individual … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All Trademarks Acknowledged.