Your monthly update of ICT continuity news and information

FEATURE ARTICLES

NOTE: If you cannot read this newsletter properly visit www.continuitycentral.com/itcnewssept2017.html

Daisy

Tips for improving decision making during incidents
Understanding what is happening within our brains when making decisions under stress can help improve performance under pressure. In this article Charles Boffin provides a helpful overview and some useful tips for ways to improve your decision making during incidents.
Read the article
• UK / World

So you have disaster recovery, but can you really avoid downtime?
Disaster recovery is imperative for the survival of any organization and whilst many businesses have some form of strategy in place, they need to ensure they can maintain continuity should a disaster strike. The concept is not new, so why are we still seeing many organizations fall victim to downtime? Johan Pellicaan looks at this question.
Read the article
• World

The security and compliance issues related to instant messaging use
Most organizations now allow employees to use IM in some capacity; or their employees use it anyway! And with IT teams under a lot of pressure, the risks of data leakage that come with IM are often forgotten about. Thomas Fischer thinks that IM threats are worth talking about…
Read the article
• World

ClearView

My business has had a data breach, what next?
Emma Roe provides some advice to UK organizations on incident communications following a data breach: who should you inform and what should you tell them?
Read the article
• UK

Four strategies to prevent data encryption from hijacking your network
While encryption can keep your network traffic safe from hackers, it can also prevent your security and monitoring tools from seeing inside the packets crossing your network. Lora O'Haver looks at the issue and explains what organizations can do about it.
Read the article
• World

Tips for evaluating a business continuity as a service provider
Business continuity as a service (BCaaS) is an emerging trend in the market. Steve Dance looks at what BCaaS is and what questions you should ask any potential business continuity as a service provider.
Read the article
• UK / World

NEWS ARTICLES

Capital Continuity

Survey shows move towards cloud and away from data centers
Survey results have been published by Unisys which show a trend away from traditional on-premises data centers / centres towards cloud-based hosting.
Read the article
• World

DNS attacks an increasing problem for public and education sector around the world
Councils, schools and government offices were among global public sector and education organizations hit badly by DNS attacks last year – with nearly half reporting dealing with the issue cost them hundreds of thousands of pounds.
Read the article
• World

Improving metrics in cyber resiliency
The Cloud Security Alliance (CSA) has announced the release of a new white paper designed to help enterprises develop metrics and processes to measure threats before they become cyberattacks and recover functionality lost in the wake of those attacks.
Read the article
• World

Continuity2

Gartner publishes ‘Hype Cycle for Cloud Security in 2017’
The Gartner Hype Cycle for Cloud Security aims to help security professionals understand which emerging technologies are ready for mainstream use, and which are still years away from productive deployments for most organizations.
Read the article
• US / World

New NIST cybersecurity practice guide helps organizations recover from ransomware and other destructive events
NIST has announced the release of its latest practice guide, ‘Data Integrity: Recovering from Ransomware and Other Destructive Events, SP 1800-11’. As a draft NIST Cybersecurity Practice Guide, comments and feedback are being sought.
Read the article
• US / World

Test of new supply chain blockchain system confirms cyber resilience advantages
A successful pilot program delivered by logistics technology company Marine Transport International (MTI) has demonstrated that the logistics industry will see improved connectivity, efficiency and security thanks to blockchain.
Read the article
• Europe/World

eBRP

Customer-facing web applications are the biggest security challenge: survey
Synopsys, Inc. has published the results of a survey of 270 IT security professionals, which found that almost half (48 percent) viewed customer-facing web applications as the area presenting the most security risk to businesses.
Read the article
• World

Poor security hygiene and risky application use are feeding cyber attacks
Fortinet has published the findings of its latest Global Threat Landscape Report. The research reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed.
Read the article
• World

Many British boards uninformed and unprepared for cyber incidents
Britain’s top firms urgently need to do more to protect themselves from online threats, according to new Government research and a ‘cyber health check’ published recently.
Read the article
• UK

The 2017 Cloud Security Report: public cloud platforms more secure than on-premise
Alert Logic has published its 2017 Cloud Security Report. The report analyzes customer data from more than 3,800 Alert Logic cloud, on-premises and hybrid cloud customers over an 18-month period, from August 1, 2015 to January 31, 2017.
Read the article
• US / World

Cyber attacks attacks on manufacturing industry continue to rise
The frequency and sophistication of cyber attacks continues to rise globally according to research data from the Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report released by NTT Security, an NTT Group company.
Read the article
• World

UK companies’ confidence in IT disaster recovery plans is decreasing
New research from Databarracks has found that organizations have become less confident in their ability to recover from an incident. Contributing factors include a lack of testing, budgetary constraints and the growing cyber threat landscape.
Read the article
• UK

Hackers are turning to steganography to cover their tracks
While analysing multiple cyber espionage and cyber criminal campaigns, Kaspersky Lab researchers have identified a new, worrying trend: malicious hackers are increasingly using steganography – a digital version of an ancient technique of hiding messages inside images - to conceal the tracks of their malicious activity on an attacked computer.
Read the article
• World

‘Blind spots’ are a major obstacle to data protection
Gigamon Inc. has published the results of a commissioned survey, ‘Hide and Seek: Cybersecurity and the Cloud,’ conducted by Vanson Bourne.
Read the article
• UK / World

CALL FOR PAPERS

Written a relevant article or white paper? We'd like to consider it for publication on Continuity Central. Simply e-mail editor@continuitycentral.com

You have subscribed to this newsletter. To unsubscribe visit:
http://www.continuitycentral.com/index.php/unsubscribe or e-mail webmaster@continuitycentral.com

This email was from:
Portal Publishing Ltd, PO Box 1393, Huddersfield, HD1 9TN, UK, Tel: +44 1484300750