Archive for the ‘Risk Management’ Category

Mobile use threat to data security

 As staff increasingly use their own mobile devices, is security a growing problem?

“Mobile malware is frequently spoken of in apocalyptic terms but the truth is that corporate mobile devices are far more likely to slip out of a pocket, be left in a cab or get snatched off a table than be probed by a hacker,” says Craig Heath, chief security technologist at the Symbian Foundation which develops the operating system used by Nokia, Samsung and Panasonic in their smartphones, reports London’s Financial Times.

The IT issues for 2011: data privacy, security, management and sovereignty

With more and more data moving to online environments and being hosted outside the traditional enterprise firewall, a myriad of questions are being raised surrounding data privacy, security, management, and sovereignty, says Peter O’Connor, VP ANZ & ASEAN at NetApp.

Writing on he says: “Careful consideration needs to be given to standards and regulations around data protection and storage. How will these compliance policies affect business outcomes? And how will they work in a global economy in which companies cross so many borders?”


Policy-makers setting the pace

Firms warned over cyber attacks

Companies are leaving themselves vulnerable to the “growing menace” of cyber attack, according to a report, says the Press Association ( 

Although 82% of big British companies agreed that cyber criminals were innovating faster than businesses, 94% were confident their systems were well-protected, the Cyber Security Monitor security specialists Detica said.

But Henry Harrison, Detica’s technical director, said the threat was being underestimated. He said: “Awareness of the real commercial threat to private industry appears to remain low. It is surprising that the vast majority of those questioned believe themselves to be adequately equipped to deal with a direct cyber attack, as the most commonly quoted forms of IT security in the survey, firewalls and anti-virus software, leave many organisations vulnerable.

Six wireless threats to your business

 From Christopher Elliott, Microsoft Business,broadbandmobility

The Evil Twin. One of the most popular new threats to Wi-Fi users is the Evil Twin, sometimes referred to as WiPhishing. It’s a rogue access point that replicates another network name, such as that of a hot-spot or a secure network. “The Evil Twin waits for a user to mistakenly sign into the wrong access point and captures the user’s network data or attacks the computer,” says Mike Klein, chief executive of Interlink Networks, Inc, an Ann Arbor, Mich. Wi-Fi security firm for small businesses. Klein recommends using an application like the free LucidLink Wireless Client (, which automatically detects the change of security settings and warns the user to prevent an Evil Twin attack. He says it’s also best to stay away from any open, or unsecured, wireless networks.

Most mid-sized businesses ignore the risks of technology disasters

Symantec (producers of Norton antivirus software) has produced compelling evidence that small and mid-sized businesses are seldom well-prepared to deal with technology disasters. Their 2009 SMB Disaster Preparedness Survey (based on interviews with more than 1650 respondents from 28 countries in North America, Europe, Middle East and Africa, Asia Pacific and Latin America) shows a large discrepancy between how SMBs perceive their disaster readiness and their actual level of preparedness.

The data also suggests SMB downtime costs their customers tens of thousands of euros each year. As a result, the findings show that SMBs can – and often do – lose business as a direct result of being unprepared for disasters.