Lack of Cyber Security

Governments and international business are only just waking up to the threats posed by a lack of cyber security. Sophisticated systems, interconnecting across international borders, are increasingly being targeted by cyber criminals, terrorist groups and foreign governments as a way of stealing data, blackmailing and virus attack. Business is failing to meet the challenge posed … Read moreLack of Cyber Security

The ‘Triple A’ Security Approach

Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. In the world of IT however, how can a chief information officer or information technology decision maker (ITDM) rate the efficiency of an IT security implementation? IT security is one of the main concerns for ITDM’s with attacks … Read moreThe ‘Triple A’ Security Approach

The Internet of Things is dangerous!

Source: DDoS attacks are Dangerous (original in German) Brian Krebs is an IT security specialist journalist. On 20 September 2016 his WordPress blog was attacked with a DDoS attack. DDoS means “Distributed Denial of Service”, i.e. “distributed denial of service”. It conceals tons of pointless requests that a server flooding until it crashes. You can … Read moreThe Internet of Things is dangerous!

Innovations, Awareness and anticipating on Security threat’s

Recently I was writing my former blogs “Finance a Hacker” and “No 100% awareness of Cyber and Data Security within many companies worldwide” I want to go a little deeper in to these topics and hope to make people aware of the known risks. There are still companies, security architects who think that when you … Read moreInnovations, Awareness and anticipating on Security threat’s

Social media dos and don’ts: What you need to know

How can we keep the Internet a safe place? Take note of these guidelines People are very active on social media. Out of 1.71 billion people have active Facebook accounts. Twitter, meanwhile, has 313 million monthly active users. The use of social media, however, has evolved from just a mere way to catch up with friends … Read moreSocial media dos and don’ts: What you need to know

Parsing The 20 Critical Security Controls

As a CISO you’re faced with a fairly daunting challenge – ensure that everything you do for your enterprise is effective for your security and for your compliance. The key word isn’t security, and it’s not compliance, it’s effective. How do you know what you’re doing is effective when you’re potentially faced with legal (SOX), regulatory (HIPAA), contractual … Read moreParsing The 20 Critical Security Controls

Data protection Overview of the General Data Protection Regulation (GDPR)

Introduction 3 Principles 5 Key areas to consider 7 Individuals’ rights 11 The right to be informed 12 The right of access 15 The right to rectification 17 The right to erasure 18 The right to restrict processing 20 The right to data portability 21 The right to object 23 Rights related to automated decision … Read moreData protection Overview of the General Data Protection Regulation (GDPR)

Verified by MonsterInsights