Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Secure systems, secure data, secure people, secure business<br />
Computing Security March/April 2017<br />
contents<br />
CONTENTS<br />
Computing<br />
Security<br />
Malware fightback<br />
Predict..Prevent..Protect<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
Only human, after all<br />
How do we safeguard against<br />
human error in data breaches?<br />
IoT: threat and treat<br />
How to avoid the downsides<br />
A breach too far<br />
Security breaches could<br />
bring massive fines<br />
COMMENT 3<br />
Voicing deep concerns<br />
NEWS 5<br />
• 'Witchcraft' slur prompts backlash<br />
• Businesses begin to fight back<br />
ARTICLES<br />
SIMPLE TWIST OF FATE 8<br />
In Part 2 of our look at what the experts<br />
are predicting for security in 2017, the big<br />
message is that things are going to get<br />
worse - and not necessarily before they<br />
get better!<br />
SCAMMERS GET SCAMMED! 30<br />
Hackers and attackers are often seen<br />
as being in total control, causing utter<br />
mayhem for unsuspecting and defenceless<br />
organisations. But sometimes they get<br />
a lot more than they bargained for!<br />
SOLDIER'S FIGHTING QUEST 32<br />
Dorset-based cyber-security company C3IA<br />
Solutions is backing the efforts of a British<br />
soldier who wants to build a library in his<br />
impoverished home town in Ghana<br />
CLOUD-BASED SECURITY 33<br />
Many companies' endpoints represent<br />
under-secured, unnecessary risks. A new<br />
cloud-based service has been set up to<br />
help remedy that<br />
BREACHES SURGE 34<br />
Cyber security incidents are soaring.<br />
That could be bad news for businesses<br />
when the GDPR comes into force next year<br />
REVIEW<br />
• CYjAX Intelligence Platform 16<br />
MALWARE MALEVOLENCE 14<br />
The average breach results in a cost of<br />
$158 per stolen record and is often not<br />
detected for an average of 229 days, it is<br />
estimated. Where should the fightback<br />
against malware begin?<br />
THE FINGER OF BLAME 18<br />
Employees are a company's greatest asset.<br />
Businesses say so emphatically. But<br />
sometimes those same employees are the<br />
ones who spark a data breach, albeit<br />
unwittingly, through careless actions - or<br />
lack of planning on the part of their bosses<br />
CENTRE OF EXCELLENCE 22<br />
A massive step forward has been taken in<br />
the battle to outwit the cybercriminals -<br />
in the shape of the new National Cyber<br />
Security Centre. Brian Wall reports<br />
IOT - THE GOOD AND THE BAD 26<br />
Having suffered two of the largest hacks<br />
in history, Yahoo ended 2016 very much<br />
on a low note, with its approach to cyber<br />
security brought seriously into question.<br />
So what went so wrong - and how can<br />
others learn from its mistakes?<br />
4<br />
computing security March/April 2017 @CSMagAndAwards www.computingsecurity.co.uk