Tips for taking cyber cover
The article offers suggestions for taking cyber security insurance and emphasises that transferring risk to an insurer doesn't mean you are risk-free. You should look carefully at what is not included in your cyber insurance cover.
7 pressing cybersecurity questions
This article offers 7 questions to ask to make sure your board understands how cybersecurity is being managed by your organisation. Asking these questions will also raise awareness of the importance of cybersecurity, and the need to prioritize action.
ICO criticises government-backed campaign to delay end-to-end encryption
The article reports that the Information Commissioner's Office (ICO) has stepped into the debate over end-to-end encryption (E2EE), warning that delaying its introduction leaves everyone at risk – including children. It mentions that the privacy watchdog said end-to-end encryption plays an important role in safeguarding privacy and online safety, protecting children from abusers, and is crucial for business services.
Cybersecurity and forensic accounting join forces to combat criminals
How the skill sets of cybersecurity and forensic accounting experts can intertwine and be used collaboratively when cybersecurity issues come to light.
Cloud storage compliance pitfalls
Article outlines post-Brexit cloud storage compliance issues that could be an issue for organisations. These include the Data Protection Act 2018, the Payment Card Industry Data
Security Standard (PCI DSS) and the Network and Information Systems (NIS) Directive.
The critical first step to data security
The article discusses the essential data security strategies that management accountants can use in applying business performance measurement skills in the identification of key performance indicators (KPI) for data security and classification. Topics include the IBM data showing that data breach average cost stood at 4.24 million dollars in 2020, and the importance of data classification as the foundation of data security.
UK data regulations set for 'common sense' changes
Article reports on the launch of a major conultaion by the Department for Digital, Culture, Media and Sport (DCMS), centring on proposed changes to the UK’s data protection regime in a post-Brexit environment, alongside reforms to the Information Commissioner’s Office (ICO).
How do SOAR and SIEM fare in a rapidly changing cyber threat landscape
Article discusses whether SOAR (security orchestration, automation and response) and SIEM (security information and event management) technologies are still effective tools for IT security as cyber threats grow.
How internal audit helps increase cybersecurity transparency for the board
Article discusses how internal audit can help the board see an accurate picture of cyber risk
Best practices for safe printing
Article discusses how the humble printer is an often overlooked cyber security risk in any office, offering hackers backdoor access into the corporate network. Best practice recommendations are made.