Risk Management

Unknown danger: 74% of Internet users unaware of QR Code Spam despite growing problem

27 November 2019, London – Seventy four per cent of British internet users have never heard of QR code spam, according to a recent representative survey commissioned by European email provider GMX. This is despite a significant increase in QR code spam being detected by GMX email security experts. They analysed how spammers change their methods by running so called ‘honey traps’, which are special email accounts without spam filters which aim to attract as much spam as possible. The analysis of the contents of these traps show that QR code spam is trending in 2019 top spam methods.

How to Protect Your Tech Business in 2020 Lexie Lu Fri, 10/18/2019 - 09:30

No matter what type of business you run, there are risk factors you must navigate if you wish to maintain the same level of profit and growth. Tech businesses, in particular, may be susceptible to harm from interruptions such as hacking or power loss. Although there is potential for great profit in this sector, there is also the possibility that people could steal your ideas — not to mention fierce competition. A minor mishap can cause you to fall behind others selling the same or similar services or products.

New Global Study of Financial Sector Shows Deep Concern About Third-Party Cyber Risk, Reveals Major Opportunity to Improve Monitoring and Reporting

London, UK — 2nd April 2019 — BitSight, the Standard in Security Ratings, and the Center for Financial Professionals (CeFPro) today released a joint study shedding light on how financial institutions are addressing challenges associated with third-party cyber risk. Based on a survey of financial services professionals from around the world, the “Third-Party Cyber Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices” report found that managing third-party cyber risk is critical to their businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could leave organisations vulnerable to data breaches and other consequences.

RiskIQ finds Ticketmaster breach part of massive credit card skimming campaign affecting over 800 e-commerce sites

London, UK - July 10, 2018 - RiskIQ, the leader in digital threat management, today revealed that its researchers have discovered that the recent breach of Ticketmaster was not a one-off event as initially reported, but part of a massive digital credit card-skimming campaign by the threat group Magecart affecting over 800 e-commerce sites around the world.

Medical Device Industry Survey Reveals Increase in Agile Development

MINNEAPOLIS, May 15, 2018 – Perforce Software, a provider of solutions to enterprise teams requiring productivity, visibility, and scale along the development lifecycle, released the results of a global survey of medical device professionals. Key findings show increased concerns for mitigating risk and proving compliance during the development process. 

“Balancing compliance and risk management with fast-paced innovation is a tough challenge for medical device developers,” said Tim Russell, Chief Product Officer, Perforce. “This year’s survey results illustrate how well respondents are addressing the challenge.”

Study: Continuous Monitoring Gives Organizations Greater Control of Vendor Risk Management

BitSight, the Standard in Security Ratings, today released the results of a March 2018 commissioned study conducted by Forrester Consulting titled “Take Control of Vendor Risk Management Through Continuous Monitoring.” The findings reveal that current methods for managing third-party risk are inefficient and that companies must adopt continuous monitoring to detect security and risk issues to better understand their vendors’ cybersecurity posture and overall risk posed to their business.

UK Emergency Services at risk of major cyber-attack, overall infrastructure resilient

London, UK. [27 February 2018] The UK’s emergency services are at risk of a major cyber-attack. This is the finding of a new landscape analysis, issued this morning by leading threat intelligence provider, Anomali.

The UK Threat Landscape report, which explores the UK’s Critical National Infrastructure against threats and possible vulnerabilities, points to a number of weak spots in the UK which could attract an attack. One of the most notable, in addition to the emergency services, is the Defence Equipment and Supply Organisation which presents a prime target for actors seeking to disrupt defence procurement.

RiskIQ Announces New Digital Footprint Risk Reporting to Improve Digital Defense

LONDON - Feb. 20, 2018 - RiskIQ, the leader in digital threat management, today announced updates and enhancements to its Digital Footprint product to improve digital defences and help organizations understand their exposure to digital risk from outside the safety of their firewall.

New capabilities within Digital Footprint provide a holistic Risk Report to an organization, as it relates to their external risk exposure on the internet. Utilising RiskIQ’s industry-leading internet reconnaissance, security defence teams can dig deep into the factors that contribute to their risk to establish a plan to remediate the most critical security exposures.

Catalogic Software Updates Flagship DPX Data Protection Software

Woodcliff Lake, NJ — Dec. 18, 2017 —Catalogic Software today announced the release and general availability of DPX 4.5.1, the newest version of its data protection software that has been an industry leader in providing state-of-the-art data recovery while delivering unprecedented reliability and backup success rates for over twenty years.

“This release is the first step in restating the value of our DPX offering,” said Ethan Blynn, Vice President and General Manager of the DPX business unit. “We’re pleased that this begins a significant wave of updates and innovation to DPX that will continue through 2018.”

Hybrid Cloud Business Solutions Are Best For Protecting And Backing Up Data

Data is the most significant asset of organizations, and it has to be protected and secured from theft, loss or disasters. Moreover, as the economy is now turning real time, it becomes imperative that data must be available easily so that authorized employees can access it quickly for better productivity and improved customer service that forms the crux of digital business today.