Staff at Northern Ireland assembly warned over email breach

Warnings issued to change passwords. Northern Ireland Assembly has issued warnings to staff following cyber-attacks on its IT system, according to reports by the Belfast Telegraph. Northern Ireland Assembly has issued warnings to staff following cyber-attacks on its IT system, according to reports by the Belfast Telegraph. The publication revealed that attacks from an external…

5 Cybersecurity Tools Your Company Should Have

No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves. 1. Get…

Zuckerberg admits Facebook mistakes amid Cambridge Analytica fallout

Facebook founder Mark Zuckerberg finally commented publicly on March 21 on his Facebook page about the Cambridge Analytica controversy, in which he admitted “mistakes” were made, and acknowledged his company’s “responsibility to protect your data,” and that a “breach of trust” occurred regarding that role. Zuckerberg pointed to a “breach of trust” between Cambridge University researcher Aleksandr Kogan (who developed a Facebook quiz app in 2013), Cambridge Analytica and Facebook. “I’ve been working to understand exactly what happened and how to…

Chelsea Manning accuser Lamo dies in Kansas

Adrian Lamo, the man who dropped a dime on Chelsea Manning, died this month in Kansas. The 36-year-old hacker, who had more recently lived as a drifter and who previously was convicted for hacking Microsoft and the New York Times, was approached by then U.S. Army Private Bradley Manning who ended up pilfering and leaking a…

Ten Ways Evolving Technology Affects Cybersecurity

1. Corporate Security Breaches The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat. Unfortunately, 2012…

CYBER INSIDER RISK MITIGATION MATURITY MATRIX

Cyber security is increasingly recognised to be a people issue as much as a technical one. Boards now understand that their own employees may be the weak link in an organisation’s cyber defences. This article provides a self-assessment matrix to help organisations understand how effectively they are mitigating cyber insider risk and thus enable them…

WHO’S WATCHING YOU?

Over the last 10 years, we have witnessed massive changes in the embedded Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), DCS and Physical Security (CCTV, access controls and alarms) sectors, with the adoption of IP-capable technologies through the Internet of Things (IoT) and now the Internet of Everything (IoE). However, the mindset…