We talked before about Data Management Deficit Syndrome, and the problems it can cause. A key enabler to addressing these
Data Privacy Compliance Programme: Lessons Learned Following the ICO’s Intention to Fine British Airways £183m
The UK Information Commissioner announced her office’s intention to fine BA £183million – 1.5% of global turnover – for the
Cyber Resilience Planning for Business Recovery
Organisations that have suffered from catastrophic IT outages often describe the cause of the disruption as ‘unexpected’ when in hindsight
Malware Is Inevitable: 9 Things To Do Next
“In this world, nothing can be said to be certain, except death and taxes.” — Benjamin Franklin I would also add, “…and
The Perils of Privileged Access
System Administrators are essential to ensure that our corporate systems continue to function as they should. They are the people
Payment Security Risk: What You Don’t Scope May Hurt You
Financial services executives were stunned last year when hackers compromised payments security systems at the bank of Bangladesh and transferred
Information Integrity, The Final Frontier
It is an axiom that good IT security is based on the analysis of threats and defences and the potential
A Closer Look at SWIFT’s New Customer Security Programme
Early in 2015, news of a string of successful attacks on the “secure” SWIFT messaging network shocked the industry. Examples
Taking Control of Internal Controls
To some degree or another, most of the large financial institutions have been looking at implementing some kind of internal
A Case for Multifactor Authentication
If a picture is worth a thousand words, then the ‘World’s Biggest Data Breaches’ visualisation must be worth a million.
The Changing Face of Web Security Attacks and How to Protect Yourself
The recent UK ‘Cyber Security Breaches Survey’ showed that 65% of UK firms have been subjected to cyber attacks, including web security
IT Risk Assessment: Seeing Things in 3 Dimensions
Objectivity is not easy to come by in any walk of life; but especially so when it comes to IT
Identity and Access Management: All Rights Revoked
When it comes to IT and information security, the discipline of identity and access management (IAM) is about as important
Cloud Security: Top 10 Priorities
One of the key benefits of the Software-as-a-Service (SaaS) delivery model, which many vendors are defaulting to, is its agility.
Financial Cyber Security Attacks: Are You Prepared?
News last week that an un-named hedge fund has fallen victim to a sophisticated financial cyber security attack will have
SEC’s Cyber Security Audits: Keep Calm!
The Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) last month announced that it would carry out