Latest Security Opinions
For the first time in history, many elections will have to happen without in-person voting. In the US, we have already witnessed the pandemic’s impact on the Democratic Primaries, many of which continue to be postponed and mired in massive legal controversies. Throughout the ongoing pandemic, leaders continue to hotly debate whether or not elections that rely on in-person voting ask citizens to make a decision between civic participation and personal safety.
Dr Roger G. Johnston’s “Backwards” security maxim states: “Most people will assume everything is secure until provided strong evidence to the contrary.” The observation reflects our collective tendency to ignore potential vulnerabilities in products, services or technologies if acknowledging them interrupts our enjoyment of them or the utility they carry.
Of course, this pathology is rare in security teams, but highly present in users and consumers, who see technology as a means to an end and relish any new tool that promises to shave seconds of their daily routine. The most potent example this side of the millennium was Cambridge Analytica’s covert harvesting of our personalities via innocuous quizzes. But for today’s organisations – right here, right, now – what is the “Backwards” blindspot?
Businesses quickly adapted to enable their employees to work from home when the Government’s Covid-19 lockdown was imposed. But four weeks later, what have we learned? Is there room for improvement to keep organisations secure, productive and engaged? Tim Mercer, CEO of Vapour Cloud, advises how companies can take remote working strategies up a notch…
We all use email everyday both in our personal life and within business. The total number of business and consumer emails sent and received per day will exceed 306 billion in 2020 and is forecast to grow to over 361 billion by year-end 2024 according to The Radicati Group. That is over half the world population using email.
But do we understand the importance of ensuring our emails are secure and why?
Here are five reasons why email security must be a priority for your business.
Concerns about Deepfakes are nothing new, but the technology has advanced far faster than many anticipated and has given rise to a medium that’s terrifying in its potential.
Though watching Jim Carrey’s face on Allison Brie’s body is, admittedly, delightful, the implications for forgery are sobering.
Consider, for instance, the recent Deepfake using Vladimir Putin’s face over MIT Technology Review’s editor-in-chief Gideon Lichfield’s body. Though it’s clear that Putin himself isn’t being interviewed, it isn’t a bad effort. It also doesn’t take a big imaginative leap to envision how the technology can be further enhanced and used with nefarious intent.
In the meantime, here are five useful tips to separate digital sophistry from the real thing:
Now that the COVID-19 crisis has ushered in an indefinite period of remote work, many IT leaders are tasked with keeping security operations running smoothly from a distance for the first time.
If your organisation has both Apple and PC devices, you might be focusing your energy on Windows security and overlooking Mac and iOS vulnerabilities in the process.
The good news is that your employees’ Apple devices already have strong security systems built in. They’re just different from a PC’s lines of defense, which may be the root of several misconceptions. Here are three Apple device security myths and the features you should proactively manage instead.
Whatever the company, whatever the sector, there’s one phrase at the top of the agenda for every IT director: the ‘skills crisis’.
Undeniably, the crisis is a very real problem for IT, with significant consequences for the competitiveness of UK businesses and the economy at large. Recent Cloud Industry Forum (CIF) research starkly illustrated this problem, revealing that 40 per cent of organisations believe their efforts to implement digital transformation are hampered by a lack of staff and skills.
As the coronavirus emergency develops, these skills challenges are set to aggravate further. Mainframe operations, in particular, may be put under pressure, creating issues for mission critical workloads like on-premise SAP.
Some have them openly saved on a notepad. Others prefer to add them as a random contact on their mobile phone. A few try to remember them off by heart – but ultimately most people have to go through the rigmarole of resetting passwords on a regular basis.
Since the early days of computing back in the 1960s, passwords have been the go-to method for computer security. They are simple and straightforward to implement, enabling a user to keep files and data secured by requiring a specific and unique string of characters for access.
At the time of writing, the majority of the world’s governments have effected stay-at-home measures, mass confinements which would be unnavigable for businesses without cloud software and infrastructure. If we didn’t appreciate it before, the sheer power, necessity, even, of cloud computing has been keenly felt in recent weeks.
Zoom, the free to use video conferencing app, has exploded in the last month. It quickly became a household name and more than doubled its share price. However, Zoom has come under fire recently from the security community. Accusations and concerns around privacy and security features have been raised. Zoom is not alone here though. In fact many of the webinar and conferencing applications have attracted widespread criticism. Zoom has proved to be one of the most popular platforms and was therefore placed under the security microscope.
The use of public cloud may well provide the capability to rapidly address these challenges, to help extend the current operational environment in a hybrid model or create an entirely new footprint within the cloud. While there certainly are benefits to accelerating the move to the cloud at this critical point, there are also many risks to be aware of.
An understanding of cloud best practices, especially regarding security and governance, should be at the forefront of any changes.
While governments and public healthcare specialists are looking into the timing and manner of reopening the economy, it is clear that at some point in the hopefully not-too-distant future restrictions will be eased and businesses will return to normal operations.
Returning to recently-vacated offices will certainly signify a return to normality, and for most, that will be a welcome relief after working from home for an extended period. However, just as the shift to working from home required organisations to adapt and act differently, so will the return to the office. In this post, we discuss the preparation CISOs should consider making to offset a number of security implications that arise from returning your workforce from home and back to the office.