ICO criticises government-backed campaign to delay end-to-end encryption
The article reports that the Information Commissioner's Office (ICO) has stepped into the debate over end-to-end encryption (E2EE), warning that delaying its introduction leaves everyone at risk – including children. It mentions that the privacy watchdog said end-to-end encryption plays an important role in safeguarding privacy and online safety, protecting children from abusers, and is crucial for business services.
Cybersecurity and forensic accounting join forces to combat criminals
How the skill sets of cybersecurity and forensic accounting experts can intertwine and be used collaboratively when cybersecurity issues come to light.
Cloud storage compliance pitfalls
Article outlines post-Brexit cloud storage compliance issues that could be an issue for organisations. These include the Data Protection Act 2018, the Payment Card Industry Data
Security Standard (PCI DSS) and the Network and Information Systems (NIS) Directive.
The critical first step to data security
The article discusses the essential data security strategies that management accountants can use in applying business performance measurement skills in the identification of key performance indicators (KPI) for data security and classification. Topics include the IBM data showing that data breach average cost stood at 4.24 million dollars in 2020, and the importance of data classification as the foundation of data security.
UK data regulations set for 'common sense' changes
Article reports on the launch of a major conultaion by the Department for Digital, Culture, Media and Sport (DCMS), centring on proposed changes to the UK’s data protection regime in a post-Brexit environment, alongside reforms to the Information Commissioner’s Office (ICO).
How do SOAR and SIEM fare in a rapidly changing cyber threat landscape
Article discusses whether SOAR (security orchestration, automation and response) and SIEM (security information and event management) technologies are still effective tools for IT security as cyber threats grow.
How internal audit helps increase cybersecurity transparency for the board
Article discusses how internal audit can help the board see an accurate picture of cyber risk
Best practices for safe printing
Article discusses how the humble printer is an often overlooked cyber security risk in any office, offering hackers backdoor access into the corporate network. Best practice recommendations are made.
How to get users to pay heed to security training
Article discusses how business can get their staff to take growing cyber security risks and the resulting training seriously.
Cybersecurity from within
Article discusses internal IT security threats and how these shouldn't be left to the IT department and should b addressed by an organisation's internal controls.