Why healthcare is a vulnerable sector for cyber attack – and what can be done about it

(c)iStock.com/jackaldu

2017 is set to feature greater attacks on internet security; the broad adoption of IoT seen to be easily compromised coupled with data often held on legacy systems is likely to capture attention.

Healthcare represents one of the sectors vulnerable to IoT attacks. As more and more people adopt smart wearables and mobile apps tracking fitness the bank of hackable data for cyber criminals is growing and the value of the information is increasing which makes attacking more rewarding....

By Duncan Hughes, 17 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Four in 10 firms admit suffering crucial data loss from a mobile device

(c)iStock.com/Chunumunu

Four in 10 companies have suffered a loss of key corporate data from a mobile device, according to new research from industrial IT services provider NetEnrich.

The study, which polled 150 North America-based IT professionals, argues corporate IT is “hounded” by concerns over mobile security. More than half (54%) of respondents say getting employees to review the company’s policy on mobile devices is the most difficult part of managing employee use, while a similar...

By James Bourne, 14 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

Why cybersecurity must be a C-suite priority

(c)iStock.com/BlackJack3D

Digital technology has fundamentally changed business practice over the past decade. Cloud based applications dominate, workers routinely access corporate information remotely via smart phones and access to the corporate network increasingly includes supply chain members, contractors and part time workers.  Yet cybersecurity has failed to keep up – and some of the responsibility has to lie with the C-suite.

Why are cyber security experts not involved from day one in every...

By Adam Boone, 18 August 2016, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Security.

Is paying up an answer to ransomware, or a questionable choice?

(c)iStock.com/MarianVejcik

Ransomware attacks are on the rise. This “spray and pray” type of malicious software blocks access to compute systems and encrypts computer files until money is paid. This standstill approach has made ransomware a serious and costly threat to businesses today. In fact, CryptoWall reportedly brought in roughly 18 million dollars from victims between April 2014 and June 2015.

And while...

By Richard Walters, 27 July 2016, 0 comments. Categories: Authentication, Data Loss, Enterprise Mobility, Security.

Why healthcare CIOs and directors are concerned over meeting 2020 paperless deadline

(c)iStock.com/FangXiaNuo

Two in five healthcare professionals admit that patient records are not currently digitised in their organisation, while the move to mobile and wearable technology is gaining momentum, according to a new survey from OpenText.

The report, conducted via iGov Survey, found interesting benefits for those who had already digitised certain records; access to data anytime, anywhere was considered important to almost half (49%) of those polled, while faster access to data and information...

By James Bourne, 01 July 2016, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Wearables.

The paperless NHS: Are fully electronic patient records truly attainable?

(c)iStock.com/Marbury

In 2013, Health Secretary Jeremy Hunt pronounced that “the NHS cannot be the last man standing as the rest of the economy embraces the technology revolution… only with world class information systems will the NHS deliver world class care.”  With that, he laid out his ambition for the NHS to be ‘paperless at the point of delivery’ by 2018. 

That deadline has since been revised to 2020, but the programme received a shot in the arm earlier this year,...

By Ryan Jordan, 30 June 2016, 2 comments. Categories: Case Studies, Data & Analytics, Data Loss, Employees.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

Seven tips for avoiding data migration disasters

(c)iStock.com/Peter Hermus

Whether you’re changing ERP, CRM, or other central applications, transferring data between systems is never a simple task. The complexity of data-migration jobs often results in cost overruns and delays. Mistakes made during migrations can lead to costly downtime, diminished end-user productivity, and the loss of important data.   

But if you do the necessary preparation work and fully think through the process, you can avoid some of the most common data migration...

By Stephan Romeder, 26 May 2016, 0 comments. Categories: Cloud , Data & Analytics, Data Loss.

Enterprise mobile security: A proactive approach to protecting data

(c)iStock.com/piranka

For many people, the line between work and personal life is blurred.

When it comes to mobile devices, 80% of the workforce admits to using their devices for both business and private use, which means personal data and company data will naturally converge onto a single device. What’s becoming increasingly important, is how to protect the data stored on and being accessed from these devices to ensure mobile workforce security.

So how much are those corporate emails or family photos worth to...

By SafeNet, 19 May 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

A real life guide to protecting sensitive data in an IoT world

(c)iStock.com/maxkabakov

I attended the 2016 RSA Security Conference in San Francisco earlier this month.  On the first day of the conference, the Trusted Computing Group (TCG) presented a half-day seminar entitled “Securing the IoT with Trusted Computing”. There were panels with industry leaders and demonstrations of IoT in action. Much of the focus of the discussions was on the vulnerabilities in the IoT and how trust might support better security. Naturally the TCG’s TPM (Trusted...

By Garry McCracken, 29 March 2016, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Security.

2015 data breaches by the numbers: Still plenty of work to do

(c)iStock.com/dra_schwartz

By Andrew Gertz, SafeNet

Do you want the good news or the bad news about 2015 data breaches? Truth be told, I’m a realist at heart — but one that wishes he could be an optimist – so let’s start with the good news.

The good

Based on the Breach Level Index (BLI), the total number of data records lost or stolen in 2015 actually decreased by 39% from 2014, the year of mega breaches.

While more...

By SafeNet, 04 March 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

The importance of security awareness training for enterprise IT governance

(c)iStock.com/AndreyPopov

Nowadays, security awareness training (SAT) is a top priority for organisations of all sizes. Thanks to SAT, management and employees can understand IT governance issues and control solutions as well as recognise concerns, understand their relevance and respond accordingly. Many companies invest heavily in cybersecurity education programs for employees to learn how to protect their computer and personal information and how to be aware of the many hacktivists and cyber-criminals that...

By Daniel Brecht, 22 January 2016, 3 comments. Categories: Data Loss, Employee Education, Employees, Security.

Verizon warns of bigger, more frequent enterprise data breaches in 2016

(c)iStock.com/weerapatkiatdumrong

Telco giant Verizon has sent out a gloomy warning: regardless of the doubling down on enterprise security, 2016 will see even more, even higher profile data breaches.

The company has released nine predictions for enterprise IT, and alongside the security snafu, Verizon also predicts a shift from the more traditional enterprise security methods to fit more with user need, leading to a more ‘common sense’ approach which will enable chief security officers to focus...

By James Bourne, 19 January 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Privacy, Security.

Good apps receive highest security certification for iOS and Android

(c)iStock.com/imilian

BlackBerry has announced that a plethora of Good Technology applications, including Good Work, Good Connect and Good Dynamics, have been certified at Common Criteria Evaluation Assurance Level 4 Augmented (EAL4+) – the highest security certification available for iOS and Android.

The list of seven apps also includes secure browser Good Access, Good Control Server, Good Proxy Server, and Good Enterprise Mobility Server. The certifications come as welcome news for BlackBerry, which...

By James Bourne, 13 January 2016, 0 comments. Categories: Data Loss, Enterprise Mobility, Security.

Mobile threats: Every tool is a weapon if you hold it right

(c)iStock.com/Balavan

A good friend of mine is fond of saying: “The first thing to do in any crisis is panic, but once you’ve got that out of the way you need to figure out what you’re going to do next.” That phrase has always resonated with me because, while alarmism might be our natural instinct, it’s usually not very helpful.

Mobile malware is perplexing because we can’t seem to collectively decide whether it warrants actual panic or is just a minor irritant. The

By MobileIron, 04 January 2016, 0 comments. Categories: Data Loss, Enterprise Mobility, Malware, Security.

Why the digital revolution is creating data challenges for the NHS

(c)iStock.com/George Clerk

The digital revolution has created fundamental and irreversible changes to our way of life in terms of how we use technology such as tablets, smartphones and wearables. This is particularly true in the healthcare sector, where digitally enabled services are vital to realise those all-important costs savings as it heads to 2020.

Indeed, with government cuts being enforced onto an already stretched NHS, the healthcare sector needs to implement radical digital transformation strategies...

By Nik Stanbridge, 19 November 2015, 0 comments. Categories: Data & Analytics, Data Loss, Wearables.

Gemalto study sheds light on how greater mobility rollouts remain a challenge

(c)iStock.com/Sensay

92% of IT departments globally continue to restrict users from accessing sensitive corporate data and resources from mobile devices, according to research from Gemalto.

The findings, which appear in the 2015 Global Authentication and Identity Access Management Index, reveal how enabling greater mobility remains a challenge for larger organisations. In particular, the vast majority (94%) of respondents are concerned their organisation will be breached or hacked in terms of compromised...

By James Bourne, 05 November 2015, 0 comments. Categories: Data Loss, Enterprise Mobility, Identity, Security.

Combating digital indifference amongst Gen Y: What employers need to do now

(c)iStock.com/ra2studio

In recent years, much has been written about Generation Y, or millennials, entering the workplace and, more pertinently, how business are adjusting to manage them. This includes challenges of how to meet new aspirations and how to properly integrate them in a company that includes workers from a different generation and background.

However, in this digital age, millennials are posing a new challenge to businesses. In short, young people are careless in the way they manage passwords and...

By Guillaume Desnoes, 23 October 2015, 0 comments. Categories: Data Loss, Employee Education, Employees, Enterprise Mobility, Security.

Enterprises still struggling to meet standards for data security and control

(c)iStock.com/Melpopenem

Two in three enterprises fail to meet best practice standards for data control while more than three quarters fail to mark sensitive data during the testing and development phase of a project, according to the latest research from Actifio and IDC.

The research, which has been published in a paper entitled ‘Common Gaps in Data Control: Identifying, Quantifying, and Solving Them Using Best Practices’, argues enterprises are struggling to keep track of their data being both...

By James Bourne, 19 October 2015, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Enterprise Mobility.