23.03.2017 Views

CS1703

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Secure systems, secure data, secure people, secure business<br />

Computing Security March/April 2017<br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

Malware fightback<br />

Predict..Prevent..Protect<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Only human, after all<br />

How do we safeguard against<br />

human error in data breaches?<br />

IoT: threat and treat<br />

How to avoid the downsides<br />

A breach too far<br />

Security breaches could<br />

bring massive fines<br />

COMMENT 3<br />

Voicing deep concerns<br />

NEWS 5<br />

• 'Witchcraft' slur prompts backlash<br />

• Businesses begin to fight back<br />

ARTICLES<br />

SIMPLE TWIST OF FATE 8<br />

In Part 2 of our look at what the experts<br />

are predicting for security in 2017, the big<br />

message is that things are going to get<br />

worse - and not necessarily before they<br />

get better!<br />

SCAMMERS GET SCAMMED! 30<br />

Hackers and attackers are often seen<br />

as being in total control, causing utter<br />

mayhem for unsuspecting and defenceless<br />

organisations. But sometimes they get<br />

a lot more than they bargained for!<br />

SOLDIER'S FIGHTING QUEST 32<br />

Dorset-based cyber-security company C3IA<br />

Solutions is backing the efforts of a British<br />

soldier who wants to build a library in his<br />

impoverished home town in Ghana<br />

CLOUD-BASED SECURITY 33<br />

Many companies' endpoints represent<br />

under-secured, unnecessary risks. A new<br />

cloud-based service has been set up to<br />

help remedy that<br />

BREACHES SURGE 34<br />

Cyber security incidents are soaring.<br />

That could be bad news for businesses<br />

when the GDPR comes into force next year<br />

REVIEW<br />

• CYjAX Intelligence Platform 16<br />

MALWARE MALEVOLENCE 14<br />

The average breach results in a cost of<br />

$158 per stolen record and is often not<br />

detected for an average of 229 days, it is<br />

estimated. Where should the fightback<br />

against malware begin?<br />

THE FINGER OF BLAME 18<br />

Employees are a company's greatest asset.<br />

Businesses say so emphatically. But<br />

sometimes those same employees are the<br />

ones who spark a data breach, albeit<br />

unwittingly, through careless actions - or<br />

lack of planning on the part of their bosses<br />

CENTRE OF EXCELLENCE 22<br />

A massive step forward has been taken in<br />

the battle to outwit the cybercriminals -<br />

in the shape of the new National Cyber<br />

Security Centre. Brian Wall reports<br />

IOT - THE GOOD AND THE BAD 26<br />

Having suffered two of the largest hacks<br />

in history, Yahoo ended 2016 very much<br />

on a low note, with its approach to cyber<br />

security brought seriously into question.<br />

So what went so wrong - and how can<br />

others learn from its mistakes?<br />

4<br />

computing security March/April 2017 @CSMagAndAwards www.computingsecurity.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!