Why healthcare is a vulnerable sector for cyber attack – and what can be done about it

(c)iStock.com/jackaldu

2017 is set to feature greater attacks on internet security; the broad adoption of IoT seen to be easily compromised coupled with data often held on legacy systems is likely to capture attention.

Healthcare represents one of the sectors vulnerable to IoT attacks. As more and more people adopt smart wearables and mobile apps tracking fitness the bank of hackable data for cyber criminals is growing and the value of the information is increasing which makes attacking more rewarding....

By Duncan Hughes, 17 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Four in 10 firms admit suffering crucial data loss from a mobile device

(c)iStock.com/Chunumunu

Four in 10 companies have suffered a loss of key corporate data from a mobile device, according to new research from industrial IT services provider NetEnrich.

The study, which polled 150 North America-based IT professionals, argues corporate IT is “hounded” by concerns over mobile security. More than half (54%) of respondents say getting employees to review the company’s policy on mobile devices is the most difficult part of managing employee use, while a similar...

By James Bourne, 14 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

Examining the escalating threat of DDoS attacks

DDoS attacks have evolved into sophisticated multi-vector attacks at the network and application layers that can deplete resources very quickly and generate major service outages. Any enterprise and government organisation is at risk from the escalating threat of DDoS attacks. Download the White Paper from A10 to learn:

  • The evolution of DDoS attacks: more massive, more sophisticated, more devastating
  • How volumetric attacks target bandwidth and network components
  • How application attacks have become more complex and sophisticated
  • The elements you should consider for an...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Validating DDoS threat protection: Ensuring your solution works in real-world conditions

Multi-vector DDoS attacks are overwhelming traditional security solutions and as a result, existing DDoS defense strategies must be re-evaluated. New DDoS solutions require horsepower and capabilities to deal with the volume and complexity of simultaneous attacks.


Download this whitepaper, Validating DDoS Threat Protection, to learn:

  • Classification of DDoS attack types
  • An approach on how to effectively mitigate DDoS Attacks
  • The importance of Performance Validation to ensure predictable operations
  • How IXIA validated high performance by A10’s TPS DDoS mitigation...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Why cybersecurity must be a C-suite priority

(c)iStock.com/BlackJack3D

Digital technology has fundamentally changed business practice over the past decade. Cloud based applications dominate, workers routinely access corporate information remotely via smart phones and access to the corporate network increasingly includes supply chain members, contractors and part time workers.  Yet cybersecurity has failed to keep up – and some of the responsibility has to lie with the C-suite.

Why are cyber security experts not involved from day one in every...

By Adam Boone, 18 August 2016, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Security.

Is paying up an answer to ransomware, or a questionable choice?

(c)iStock.com/MarianVejcik

Ransomware attacks are on the rise. This “spray and pray” type of malicious software blocks access to compute systems and encrypts computer files until money is paid. This standstill approach has made ransomware a serious and costly threat to businesses today. In fact, CryptoWall reportedly brought in roughly 18 million dollars from victims between April 2014 and June 2015.

And while...

By Richard Walters, 27 July 2016, 0 comments. Categories: Authentication, Data Loss, Enterprise Mobility, Security.

Why healthcare CIOs and directors are concerned over meeting 2020 paperless deadline

(c)iStock.com/FangXiaNuo

Two in five healthcare professionals admit that patient records are not currently digitised in their organisation, while the move to mobile and wearable technology is gaining momentum, according to a new survey from OpenText.

The report, conducted via iGov Survey, found interesting benefits for those who had already digitised certain records; access to data anytime, anywhere was considered important to almost half (49%) of those polled, while faster access to data and information...

By James Bourne, 01 July 2016, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Wearables.

The paperless NHS: Are fully electronic patient records truly attainable?

(c)iStock.com/Marbury

In 2013, Health Secretary Jeremy Hunt pronounced that “the NHS cannot be the last man standing as the rest of the economy embraces the technology revolution… only with world class information systems will the NHS deliver world class care.”  With that, he laid out his ambition for the NHS to be ‘paperless at the point of delivery’ by 2018. 

That deadline has since been revised to 2020, but the programme received a shot in the arm earlier this year,...

By Ryan Jordan, 30 June 2016, 2 comments. Categories: Case Studies, Data & Analytics, Data Loss, Employees.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.