Why it’s time to ditch the password…

Posted by: David Hald  /  19 December 2016 09:25:29 GMT

Given that passwords are on the front line of defence in the security of corporates and individuals, it’s mind boggling how elementary some people’s passwords are. Some recent research by LeakedSource, delved into the frequency of use of LinkedIn’s 10 most pathetic passwords. Topping the list is “123456” with an incredible 753,305 LinkedIn users, using this most perfunctory of passwords.

Read More

Topics: Security, Password, User Authentication

“e-Safety Legal Obligations – The Fall of the Supremacy of Pedagogy”

Posted by: Dr. B. Bandey  /  19 December 2016 09:22:05 GMT

I have a proposition to make. My proposition is that it is not possible to train or educate pupils into not cyberbullying, not viewing pornography, not sexting and that the stance of many educators and education experts[1] that pedagogy is the best, the ‘supreme’ route to satisfy e-Safety legal obligations is, quite simply, wrong.

Read More

Topics: Compliance

The NIST draft guidelines have ignited an interesting debate

Posted by: Claus Rosendal  /  19 December 2016 08:48:02 GMT

 

Read More

Topics: Security, NIST, User Authentication, SMS

CensorNet shortlisted for two Computing Security Awards

Posted by: Ed Macnair  /  19 December 2016 08:47:12 GMT

We’re delighted to say that we’ve been named a finalist in two categories at this year’s Computing Security Awards! The awards recognize the best security solutions, companies, resellers and individuals in the industry – and we’re in the running for Cloud Security Solution of the Year and SME Security Solution of the Year.

Read More

Topics: Cloud, Security, Awards

A CIO and an Entrepreneur walk into a bar…

Posted by: Ed Macnair  /  19 December 2016 08:37:22 GMT

One arbitrary Google search of ‘Shadow IT’ will instantly present a buffet of opinion; not to mention some of the most spurious marketing images in the history of the internet.

That’s the trouble with the tech sector, a genuine issue arises and before you can say the words ‘Please. Just. Stop’; everyone (and I mean everyone) has a ‘solution’ and a ‘marketing strapline’ for it. You only have to look at how many times BYOD was rinsed and repeated over the last decade to know where I’m coming from.

Read More

Topics: Cloud, Security, Cloud Application Control, CASB

Targeting hospitals? The lows that hackers stoop to…

Posted by: David Hald  /  16 November 2016 22:56:00 GMT

The morals of hackers sank to new lows last week, when three hospitals across the UK were targeted with ransomware in malicious cyber attacks. The upshot was that all operations, procedures and appointments were cancelled, affecting over 1000 patients.

Read More

Topics: Public Sector, User Authentication, Ransomware

Regulation, remote working and the public sector – the ultimate balancing act?

Posted by: David Hald  /  14 June 2016 13:48:54 BST

Remote working in the public sector has never been a comfortable fit. The potential network vulnerabilities send shivers down the spines of even the most hardened public sector IT managers. Think of the data sensitivity for a hospital or a police force - you can imagine the fall out if a breach were to happen. So it’s little wonder the public sector is late to the remote working party.

Read More

Topics: Authentication in the Cloud, Cloud, Multi-factor Authentication, Security, Public Sector, Remote Access

Protecting Public Sector Data – Where Do You Start?

Posted by: David Hald  /  11 May 2016 13:56:40 BST

If you’re a public sector organization, there can’t be many more incidents worse for your reputation than a breach of data security. For hospitals, educational establishments, councils and central government departments collect very sensitive – and in hackers’ terms, very valuable – citizen data.  

And hacking attacks against the public sector are on the rise. Recent research showed that 40% of public sector IT departments have publically admitted a data breach.

Read More

Topics: Multi-factor Authentication, Security, Public Sector

Productivity vs Cyber Security? The big dilemma for Public Sector IT Chiefs.

Posted by: David Hald  /  29 April 2016 10:00:00 BST

If you’re a public sector IT professional, the chances are you’re more than a little worried about being hacked… if you haven’t been hacked already. Some recent research conducted by PWC showed that over 40% of public sector IT departments had admitted to a data breach, largely blamed on them being unable to keep pace with security trends, while at the same time coping with the digitization of government services. So why are public sector organizations such a hot target?

Read More

Topics: Security, Compliance, Productivity, Public Sector, Remote Access

‘The frankly unstoppable rise of Cloud Application Control’

Posted by: Ed Macnair  /  21 April 2016 15:05:59 BST

Once upon a time, not so long ago, we sought only to protect the Internet and Cloud Applications were simply the unruly, unknown beast that were yet to be tamed or understood. Times however have undoubtedly changed and as a consequence traditional security as we knew it, has been unceremoniously exposed to lack the flexibility demanded by the market it seeks to serve.

Read More

Topics: Authentication in the Cloud, Cloud, Security