Information Security

Group founded 04 Apr 2007
Posts 164
Members 37
Group summary

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

More blogs
See all Blogs »
Jim Steven

How COVID-19 is evolving the data breach communication process

Covid-19 is at the forefront of business minds right now, with many tasking themselves with understanding, reacting to and learning lessons from this ever-changing situation. However, although busines...

07 May 2020
Scott Cutler

Putting a price on protection: the importance of cyber insurance

For almost as long as businesses have been subject to risk, some form of insurance has existed to mitigate their exposure. The first recorded commercial insurance policies date back to Babylonian tim...

23 Mar 2020
Paul Hampton

Securing customer data in a digital world filled with threats

On New Year’s Eve 2019, hackers struck foreign exchange giant Travelex and held them to ransom. The London headquartered firm with a presence in more than 70 countries, were forced to take down all it...

10 Mar 2020
Vivek Anand Jeyaraj

Security 2020 - Fixing the link that risks breaking the chain

In 2015, two hackers, albeit in a controlled environment, hacked into a Jeep Cherokee through the entertainment system and disabled the transmission. This led to a recall of over 1.4 million vehicles ...

31 Jan 2020
Scott Cutler

Three’s a crowd: why third-party vendors are both an opportunity and a threat

From social media apps to exercise tracking and online shopping, today consumers are producing data at an unprecedented rate and businesses of every type are under pressure to ensure the safety of tha...

18 Dec 2019
Scott Cutler

More than the sum of parts: why collaboration is key to security in financial services

From “The Italian Job” to “Point Break”, “Bonnie and Clyde” to “Baby Driver”, many of the most popular heist movies are about bank robberies. As it is in fiction, so it is in fact; when bank robberies...

14 Nov 2019
Scott Cutler

FS organisations require a more sophisticated level of threat protection, here’s why

The financial services industry continues to be a prime target for cyber criminals. The opportunities available to steal payment card data, online banking accounts, compromise ATM machines using ranso...

10 Sep 2019
Doug Wick

Limiting the impact of misconfiguration and creating modified database access logs

This is the third and final article of a three-part series which investigates the top five human threats to the data held by banks and financial institutions, and offers a fresh perspective on how the...

27 Aug 2019
Doug Wick

Tackling Private Data Exposure and Cyber Theft at Banks Using Privileged Database Access

This is the second installment in a three-part series which investigates the top five threats to the data held by banks and financial institutions, and offers a fresh perspective on how the industry c...

22 Aug 2019
Doug Wick

How to Address the Top 5 Threats to Banking Data

This is the first article in a three-part series which investigates the top five threats to the data held by banks and financial institutions, and offers a fresh perspective on how the industry can ma...

21 Aug 2019