The ICO has issued a statement in response to the European Court of Justice ruling about the legal basis for the transfer of personal data to businesses that are members of the US Safe Harbor Deputy Commissioner David Smith said: “Today’s ruling is clearly significant and it is important that regulators and legislators provide a […]
UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate policies according to research released today by WinMagic Inc. The survey, conducted by CensusWide, of 1,000 office workers in organisations of 50 or more employees revealed widespread, and […]
For any organization connected to the internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from Symantec, which found Canada ranked No. 4 worldwide in terms of ransomware and social media attacks last year. These increasing attacks put customer information, and especially […]
Banks with weak cybersecurity controls could be downgraded even if they haven’t been attacked, Standard & Poor’s said Monday in a report. While it hasn’t yet downgraded a bank based on its computer security, the ratings company said it would consider doing so if it determined the lender was ill-prepared to withstand a data breach. […]
An ISACA survey of more than 900 cybersecurity experts shows that 87% expect to see an increase in mobile payment data breaches over the next 12 months 42% of respondents have used this payment method in 2015 The 2015 Mobile Payment Security Study from global cybersecurity association ISACA suggests that people who use mobile payments […]
An Infograph by ComputerScienceZone.org from here.
Cybercriminals continue to focus their efforts on what is widely considered to be the weakest link in the security chain: the user. Consequently, developing a comprehensive understanding of user behavior and the implications thereof becomes paramount to corporate security strategy. In analysing user behavior across 10 million users, 1 billion files, and over 91,000 cloud […]