2 years ago


Secure systems, secure

Secure systems, secure data, secure people, secure business Computing Security July/August 2018 contents CONTENTS Computing Security Hot-wired protection Stepping up network visibility Sparkle dulled Chrome 68 issues NEWS OPINION INDUSTRY COMMENT CASE STUDIES PRODUCT REVIEWS Starring role EU to enhance cyber resilience All-action Infosec 2018 event is a winner COMMENT 3 Password apathy - who's most to blame? EDITOR’S FOCUS 6-7 ARTICLES DAMAGE LIMITATION 8 The takedown of one cloud provider could cause $50-120 billion of economic damage: a loss somewhere between Hurricane Sandy and Hurricane Katrina DATA SECURITY, UP CLOSE 22 We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Cardwave Services, steps inside for a closer view of the challenges this brings FIGHTING MAL-ADJUSTMENT! 23 How do you stop malicious applications from entering the network? Mikko Röntynen, F-Secure, offers his thoughts ALWAYS AT YOUR DISPOSAL 24 Computer Disposals Ltd (CDL) boasts many of the UK's leading companies amongst its client portfolio. Jean-Pierre Naylor, managing director and owner, reveals what lies behind that success SECURING THE CLOUD 29 A huge data security challenge is now facing organisations everywhere, says Neil Langridge, e92plus MASTERCLASS 30 Charlotte Gurney, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions FULL-ON VISIBILITY 12 When fast-growing company HubSpot needed to gain better visibility of devices on its network and track down potential malicious activity, it turned to ForeScout A MEETING OF MINDS 14 Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia London THE DANGER AT YOUR FINGERTIPS 18 Email is being labelled the number one threat vector that is facing organisations, with a rising tide of new attacks constantly grabbing the headlines POLISHING UP THE CHROME 20 Millions of unencrypted websites may receive security warnings for visitors using Google Chrome browsers, now Chrome 68 stable updates have gone live TIME TO SHARE THE PAIN 26 The cloud may not be right for everyone, but woe betide those who take that path and then fail to embrace every security measure along the way MASTERCLASS 31 Mustafa Fikret Ottekin, advisor to the CEO, ICterra, reflects on the vital roles ALARM OVER ENCRYPTED THREATS 32 played by risk analysis and risk mitigation The cyber arms race is now moving faster than ever before, with disturbing new REVIEWS findings recently published on malware, • Celestix SecureAccess Platform 10 ransomware, encrypted threats and • My1Login Enterprise IAM 25 chip-based attacks computing security July/August 2018 @CSMagAndAwards 4

Celestix SecureAccess Secure Always On VPN. Secure Identity. Always-On VPN Unified Remote Access 2FA/MFA Support Remote Access Dashboard Alerting & Monitoring Enhanced Reporting Network Access Protection (Optional) Cloud-Based URL Filtering (Optional) Windows Logon (Optional) Client Usage Information Client diagnostics & management Remote Access Kill Switch If you are striving to mobilise your workforce, then you have probably identified limitations in using legacy VPN solutions that may result in lost productivity, increased helpdesk burden, and greater security risk. Celestix SecureAccess is a remote access platform that includes Microsoft DirectAccess and Always On VPN, delivering always-on, secure network connectivity for non-managed and managed Windows laptop, tablet devices and Macintosh computers. Deployment Options Appliance | Virtual | AWS Contact Celestix at (0) 118 959 6198 or sales@celestix,com for a demonstration.