Your monthly update of ICT continuity news and information

FEATURE ARTICLES

NOTE: If you cannot read this newsletter properly visit www.continuitycentral.com/ictnewsoct2020.html

What to look for in a next generation privileged access management solution
A security breach of a privileged account is a nightmare that organizations hope they will never need to respond to. Alan Radford explains how next generation privileged access management (PAM) solutions provide assurance in this area; and what such a PAM should include.
Read the article
• World

HA protection for SQL Server critical applications: the human factor
Sandi Hamilton looks at the importance of considering the human factor when planning and managing high availability environments for critical applications such as SQL Server. She considers inherent organizational issues which result in continuity gaps and discusses the communication and documentation practices that can reduce failures.
Read the article
• World

Addressing the risks related to unstructured data through the use of object stores
Unstructured data is proliferating, overwhelming traditional storage architectures and creating both compliance and recovery risks. Matthew Dewey explains why object storage is a promising storage option to help organizations deal with the issue.
Read the article
• World

In a remote work world, it’s time to move past VPN
In the initial rush to rapidly increase remote working as a business continuity measure to respond to the COVID-19 pandemic many organizations deployed an expansion of their Virtual Private Network (VPN). However now is the time to consider better solutions says Brad Peterson.
Read the article
• World

Cloud resilience: a collaboration
This article arose out of conversations during the BCI’s Education Month, where a number of business continuity professionals decided to work together on a document exploring various aspects of cloud resilience. Continuity Central was approached to host the article so that it could reach a wider audience; and we are happy to do so.
Read the article
• World

Four tips for protecting your company from ransomware attacks
Index Engines has identified four strategies that organizations should implement to help protect against ransomware attacks. If your organization has a gap in any of these areas then the risk of attack is enhanced…
Read the article
• World

Avoiding the pitfalls of cloud migration
When they go wrong cloud migration projects can results in downtime and disruption. Matt Lock highlights a number of common challenges experienced during cloud migration and what measures can be taken to manage these.
Read the article
• World

NEWS ARTICLES

Cyber attacks becoming more sophisticated, targeted, widespread and undetected says ENISA
ENISA, the European Union Agency for Cybersecurity, has published the 8th annual ENISA Threat Landscape (ETL) report, identifying and evaluating the top cyber threats for the period January 2019-April 2020.
Read the article
• Europe

Three quarters of UK consumers won’t shop with a organization which has experienced a successful cyber attack
With shoppers looking ahead to the busy festive season, PCI Pal, the global provider of cloud-based secure payment solutions, has released a new study that shows data security concerns will influence how and where people make their purchases this year.
Read the article
• UK

New BCI report looks at ‘Technology & Business Continuity in Organizational Resilience’
The BCI has published its latest thought leadership report, which looks at how business continuity professionals should work with their counterparts in IT and/or cyber security to increase resilience across the organization.
Read the article
• World

Gartner says organizations should use ‘composability’ to be resilient and agile during uncertainty
CIOs and IT leaders who use ‘composability’ to deal with continuing business disruption due to the COVID-19 pandemic and other factors will make their enterprises more resilient, more sustainable and make more meaningful contributions, according to Gartner, Inc.
Read the article
• World

NIST publishes guide to integrating cyber security and enterprise risk management
The US NIST has released a new publication, ‘NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM)’. This aims to promote greater understanding of the relationship between cyber security risk management and ERM, and the benefits of integrating those approaches.
Read the article
• US / World

59 percent of financial services companies suffered application downtime as a result of a DNS attack over the past year
EfficientIP has published survey results that show that organizations in the financial services sector suffer the highest cost per DNS attack, compared to organizations in other industries.
Read the article
• World

Multi-state data storage is the future say researchers
Scientists at the Arc Centre of Excellence In Future Low-Energy Electronics Technologies have published research which says that 'multi-state memory' data storage, which steps 'beyond binary' is expected to become the data storage method of the future.
Read the article
• World

Non-native disaster recovery and backup solutions adversely affect RTOs and RPOs for container-based applications
Zerto has published the key findings of a co-sponsored ESG survey and eBook entitled ‘Data Protection Trends and Strategies for Containers’. As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialised data protection strategy.
Read the article
• US / World

Why measuring the cost of downtime is important for your organization
Almost a quarter of organisations are still unable to determine what IT downtime costs their business. This is according to new research conducted by Databarracks.
Read the article
• UK

2020 Travelers Risk Index finds fewer US companies are taking steps to mitigate cyber threats
The Travelers Companies, Inc. has announced the results of the 2020 Travelers Risk Index, which found that fewer companies than last year have taken steps to mitigate cyber risks, even though the level of concern about these threats has increased during the COVID-19 pandemic.
Read the article
• US

DDoS attacks increase by 151 percent in first half of 2020
Neustar has released its latest cyber threats and trends report which identifies significant shifts in distributed denial-of-service (DDoS) attack patterns in the first half of 2020. Neustar’s Security Operations Centre (SOC) saw a 151 percent increase in the number of DDoS attacks compared to the same period in 2019.
Read the article
• World

Study shows that business continuity is one of the key factors behind cloud adoption
Aptum has published Part One of its Quarterly Cloud Impact study, which looks at overall planning and migration efforts, and the main business drivers behind cloud adoption.
Read the article
• Various

NIST releases guidance on recovering from ransomware
The US NIST has published new guidance, ‘Data Integrity: Recovering from Ransomware and Other Destructive Events (SP 1800-11)’. This demonstrates how organizations can develop and implement appropriate actions following a detected cyber security event.
Read the article
• US / World

Ransomware operators are banding together says Cyber Threatscape report
Positive Technologies has released its most recent Cyber Threatscape report, an analysis of Q2 2020 cyber incidents. The report says that there is increasing evidence that ransomware operators have started cooperating with each other.
Read the article
• World

Many organizations failing to effectively manage remote working: creating risks
A global survey conducted by Wrike, has found that six months since the wide-spread adoption of remote working began, many workers are still unsure as to what their employer expects of them. This lack of clarity opens organizations up to cyber risks and results in reduced productivity.
Read the article
• Various

Researchers discover that one in three IT environments are vulnerable to Ripple20 threat
ExtraHop has issued a report warning of the potential impact of Ripple20 vulnerabilities if affected software goes undetected and unpatched. Analyzing data across its customer base, ExtraHop threat researchers found that 35 percent of IT environments are vulnerable to Ripple20.
Read the article
• World

CALL FOR PAPERS

Written a relevant article or white paper? We'd like to consider it for publication on Continuity Central. Simply e-mail editor@continuitycentral.com

You have subscribed to this newsletter. To unsubscribe visit:
http://www.continuitycentral.com/index.php/unsubscribe or e-mail webmaster@continuitycentral.com

Read our privacy policy at https://www.continuitycentral.com/index.php/privacy-and-cookies

Continuity Central is a registered trademark