Security

How to Protect Your Tech Business in 2020

No matter what type of business you run, there are risk factors you must navigate if you wish to maintain the same level of profit and growth. Tech businesses, in particular, may be susceptible to harm from interruptions such as hacking or power loss. Although there is potential for great profit in this sector, there is also the possibility that people could steal your ideas — not to mention fierce competition. A minor mishap can cause you to fall behind others selling the same or similar services or products.

Fraud alert: Popular video app Snaptube needs careful watching

London, October 17th, 2019 – Snaptube, a popular Android smartphone video app which claims some 40 million users, has been caught making millions of suspicious transactions without the knowledge of its users. The Snaptube app features the same piece of developer software code, Mango SDK, that was at the center of the Vidmate expose earlier this year - when another popular video app from a Chinese developer was found to be conducting mass scale advertising and premium services’ subscription fraud. Snaptube also displays a common traffic pattern and similar URLs and domains as those reported with Vidmate.

FireMon Sets a New Standard for Security Process Automation

DALLAS – September 17, 2019 – FireMon sets the stage to help customers now achieve what they thought was not possible. Today, FireMon announces a new approach to security process automation designed to take the traditional market for Network Security Policy Management (NSPM) solutions to the next level.

As innovation drives business revenue, security leaders are often forced to choose between secure practices and enabling innovation, despite the potential risk. FireMon rejects the tradeoff between business priorities and protecting the organization. Customers should be able to innovate in a secure manner without sacrificing either variable.

Nearly 2 in 5 Enterprises Have Lost Business Due to Cybersecurity Performance, New Independent Study Finds

LONDON, UK - 3rd September, 2019 - BitSight, the Standard in Security Ratings, today announced the availability of a new study that evaluates how executives understand and effectively measure their cybersecurity performance and adequately communicate it to the board, senior executives, customers, and critical stakeholders. The September 2019 commissioned study conducted by Forrester Consulting on behalf of BitSight titled, “Better Security And Business Outcomes With Security Performance Management” indicates that cybersecurity performance is critical to achieving commercial success.

Alarming statistics show human error remains primary cause of personal data breaches

60% of ICO-reported breaches this year are caused by human error, with healthcare the most-affected sector

London, UK, 20th August 2019: Figures released today by Egress, the leading provider of people-centric data security solutions, obtained via a Freedom of Information (FOI) request, highlight concerning statistics on human error remaining the main cause of personal data breaches (PDBs). 

The figures show that of the 4856 PDBs reported to the Information Commissioner’s Office (ICO) between 1st January and 20th June 2019, 60% were the result of human error. 

Cloud Migration: How and Why Business Is Moving to the Cloud

The number of businesses migrating to the cloud is constantly growing. According to the 2019 research study by the Cloud Security Alliance, 69% of enterprises are moving business-critical information to the cloud. 

Statistics also say that 81% of businesses are using multi-cloud solutions. The recent State of the Cloud report claims that companies use approximately 5 cloud environments, while some greater enterprises invest in even more complex cloud infrastructures.

A one-size-fits-all approach will not be enough to secure the IoT, says TCG

San Jose, California, June 26, 2019 – Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually, the Co-chair of Trusted Computing Group’s (TCG) Embedded Systems Work Group said today.

Speaking on the second day of Embedded Technologies Expo and Conference 2019, Steve Hanna highlighted how the growing trend for greater connectivity puts everyday objects at risk of exploitation and makes mission critical systems in businesses and Governments more vulnerable to attacks.

Study: 85% of Large Enterprises Struggle to Protect Critical Network Assets from Cyberattacks and Outages

San Jose, Calif. – June 25, 2019 – Endace, a specialist in high-speed network recording, traffic playback and analytics hosting, today announced the results of its latest research study, Challenges of Managing and Securing the Network 2019, conducted by independent, US-based research company, Virtual Intelligence Briefing (VIB).

The study surveyed senior executives and technical staff at more than 250 large enterprises globally to understand the challenges that these organizations face in protecting their networks from cyberattack and performance issues.

New Research Shows Surge in Malicious Office Documents, Mac Malware and Web Application Exploits

25 June 2019 – WatchGuard® Technologies’ latest quarterly Internet Security Report shows a massive 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. The report also found that cyber criminals are leveraging a wide array of varied attack techniques, including malicious Microsoft Office documents, Mac malware and web application exploits. These results illustrate that hackers are doubling down on well-known tactics like credential theft and ransomware by utilising fake Office documents and other attack vectors that require advanced defenses to combat a wider variety of threat vectors.