Nearly half of all companies in India have security policies prohibiting employees using their own mobile devices for work purposes,a survey has revealed. A survey by IT security association ISACA polled more than 4,000 members from 83 ...
Tags: India, BYOD, mobile devices, ISACA's research
Global fraud gang Operation High Roller – which targeted European finance firms earlier this year – has spread in the last three months to countries including the US, according to McAfee's latest threat report. Operation High ...
Tags: Operation High Roller, finance firms, McAfee, Guardian Analytics
Many UK organisations are still failing to understand the implications of data breaches and estimate the costs of recovery accurately,a study has revealed. Of the UK companies that have not yet suffered a breach,58%told the Ponemon ...
Tags: data breaches, UK companies, breaches, cyber crime
An NHS trust is to challenge a monetary penalty notice issued by the Information Commissioner's Office(ICO)in a case that could set an important precedent. The NHS trust is to be the first public sector organisation to challenge the UK ...
Tags: NHS, ICO, fine, monetary penalty, Information Tribunal
The Information Commissioner's Office(ICO)must focus on encouraging organisations to raise employee awareness of the need for robust data security,and not just rely on the threat of fines to do this. So argues Phil Allen,director of ...
Tags: data loss, ICO, robust data security, Phil Allen
A second-hand laptop purchased on auction site eBay has been found to contain over 5GB of confidential information relating to global telecoms company Alcatel-Lucent. The files,shown exclusively to Computing,include service,fault and ...
The Samsung Galaxy Tab is not suitable for enterprise use due to its serious security failings,according to security specialist Context Information Security. Research conducted by Context Information Security examined the three most ...
UK domain registrar 123-reg is helping website owners to protect themselves and their visitors with a new tool that identifies and helps remove malicious code from legitimate websites. According to the latest Anti-Phishing Working Group ...
Tags: compromised websites, legitimate websites, star Emma, Scanner software
Deputy Information Commissioner David Smith has told Computing that,while he does not dispute the accuracy of figures to suggest a 1,000 per cent rise in UK public and private sector data breaches in the past five years,he is unsure ...
Tags: ICO, Computing, data breaches, NHS data
Security experts believe passwords offer little or no protection from unauthorised access to corporate IT systems and online accounts, and now Intel is working on an alternative. An increasing number of data breaches are being blamed on ...
Tags: Intel, unauthorised access, IT systems, online accounts
Information security awareness needs to be company-wide, according to Julie Peeler, director of the (ISC)2 Foundation. "Organisations need to think beyond IT when planning IT security awareness training, and tackle it from the bottom up, ...
Tags: IT Security, Company-Wide, Julie Peeler, awareness training
When it comes to good government IT strategy, only collaboration will work in the long term, according to Hord Tipton, executive director of professional certification body (ISC)2. But after that, governments should stop trying to ...
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists. More attackers are now getting their hands on tools like Zeus and SpyEye, according ...
Tags: Online cyber criminal, sophisticated attack tools, Cyber Attack Tools
Data security breaches across private-and public-sector organisations in the UK have risen by an average of 1,000 per cent over the past five years,according to figures obtained from the Information Commissioner's Office(ICO). According ...
Tags: UK, ICO, Data security, Imation, Data breaches