Your monthly update of ICT continuity news and information

FEATURE ARTICLES

NOTE: If you cannot read this newsletter properly visit www.continuitycentral.com/itcnewsfeb2019.html

Daisy

The right to be forgotten versus the need to backup
The right to be forgotten is a fundamental aspect of both the GDPR and CCPA privacy laws; but its impact on personal information in data backups has yet to be tested. Bill Tolson explains the issue and provides some practical advice.
Read the article
• Various

CTO? Why updating your backup strategy should be on your 2019 to-do list
Backup technology has evolved over the years, but the time has come to take a completely fresh approach, says Avi Raichel. In this article Avi explains: Why backup is a CTO concern; What CTOs need to do to update the backup strategies in place; How CTOs can help the business become IT resilient.
Read the article
• World

2018's outages: what are the lessons for 2019?
Doron Pinhas looks at the common factors behind various high-profile technology outages in 2018 and proposes a practical approach which will help organizations reduce unplanned downtime in 2019.
Read the article
• World

ClearView

Adam’s Law? Vulnerability to disruption increases with development
Paul Barry-Walsh argues that as complexity increases in society, so do interdependencies. To prevent cascading disasters, organizations need to implement firebreaks which will ensure that they do not become the weak link in the supply chain.
Read the article
• UK / World

Mind the gap: cloud security best practices
Rich Campagna explores the security and compliance risks associated with data stored in – and accessible from – cloud applications, setting out best practices for assuring end-to-end protection.
Read the article
• World

Protecting business networks with the power of AI
Organizations may be tempted to dismiss artificial intelligence as something which is currently out of their reach, but Thorsten Kurpjuhn says that this is definitely not the case. In fact, AI can help businesses of all sizes to ensure network uptime and protection.
Read the article
• World

Assurance Software

How did the managed service provider industry successfully hijack the term ‘business continuity’?
Alex Janković claims that some managed service providers have successfully managed to equate business continuity with IT disaster recovery, resulting, at best, in confusion among those new to the profession and, at worse, the development of business continuity plans that are not fit for purpose.
Read the article
• US / World

Building an effective computer security incident response team
As the volume and variety of cyber attacks on businesses continue to grow, the need for better incident response has never been greater. Stephen Moore discusses how to build an effective CSIRT and the role it can play in protecting an enterprise in the event of a breach.
Read the article
• World

NEWS ARTICLES

Fortress

Data breach impacts: US and UK consumers react differently
The consequences of a data breach have a greater impact in the United Kingdom versus the United States, according to a survey into consumer trust and spending habits conducted by payment security specialists, PCI Pal.
Read the article
• US/UK

AI and machine learning now being used to improve the effectiveness of cyber attacks
KnowBe4 has released the results of new survey-based research, ‘What Keeps You Up at Night – The 2019 Report’. The report looks at over 350 organizations globally and reveals their security weaknesses and concerns.
Read the article
• UK / World

Risks for UK businesses adopting 5G and IoT assessed by EY
UK businesses are most concerned about the susceptibility of 5G to cyber attacks according to EY’s latest Technology, Media and Telecommunications (TMT) research.
Read the article
• UK

Capital Continuity

Digital twins are entering mainstream use: Gartner survey
Gartner defines a digital twin as a software design pattern that represents a physical object with the objective of understanding the asset’s state, responding to changes, improving business operations and adding value. They have potential uses for improving organizational resilience.
Read the article
• World

UK businesses losing control of network devices
49 percent of UK businesses surveyed are leaving themselves vulnerable to cyber attacks by having unknown devices on their network, new research for Forescout has revealed.
Read the article
• UK

Healthcare sector putting itself at risk by not dealing with legacy applications
A new white paper entitled, ‘Legacy Applications: A Healthcare Cybersecurity Nightmare’ highlights that legacy applications continue to pose serious cyber security risks in the healthcare sector.
Read the article
• US / World

Risk Logic

The 2019 Cyber Security Risk Report
Aon plc has released its 2019 Cyber Security Risk Report. The report, which details the greatest cyber security threats and challenges organizations are currently facing, discusses that as companies continue to use technology to speed up the transfer of information, game-changing business opportunities are created, as well as increased cyber risk.
Read the article
• World

89 percent of UK organizations say that cyber attacks have become more sophisticated
Carbon Black has published the results of its second UK Threat Report. The research indicates that the UK’s cyber threat environment is intensifying: attacks are growing in volume, and the average number of breaches has increased.
Read the article
• UK

DDoS attacks increase in volume and complexity during Q4 2018
Cloud anti-DDoS vendor Link11 has released its DDoS findings for Q4 2018, revealing that the volume and complexity of attacks continued to grow during the final quarter of 2018.
Read the article
• Europe / World

eBRP

Report looks at penetration testing of corporate information systems: identifies many weaknesses
In external penetration testing undertaken for corporate clients in industrial, financial, and transport verticals in 2018, Positive Technologies found that, at the vast majority of companies, there were multiple vectors in which an attacker could reach the internal network.
Read the article
• World

ENISA publishes online tool for IoT risk assessments
ENISA, the EU security agency, has released an online tool aimed at helping IoT users to conduct risk assessments and to save time when identifying threats and prioritising security areas of importance.
Read the article
• Europe

Lack of awareness amongst top management is adding to cyber security issues says report
A new report from The Bunker has highlighted that senior executives are still often the weakest link in the corporate cyber security chain and that cyber criminals target this vulnerability to commit serious data breaches.
Read the article
• UK / World

The use of cyber threat intelligence needs improving finds SANS survey
There is substantial room for improvement in the use of cyber threat intelligence (CTI), according to the results of the 2019 SANS Cyber Threat Intelligence Survey.
Read the article
• US / World

New ENISA Threat Landscape report analyses the latest cyber threats
In 2018, the European cyber threat landscape changed significantly. The most important threat agent groups, namely cyber criminals and state-sponsored actors have further advanced their motives and tactics. This is according to the latest Threat Landscape report from the EU information security agency, ENISA.
Read the article
• Europe

Assessing the impacts of a global ransomware attack
A new report published by Lloyds explores the impacts and economic costs of a future highly effective ransomware attack and concludes that the global economy is not ready to deal with such an attack.
Read the article
• World

CALL FOR PAPERS

Written a relevant article or white paper? We'd like to consider it for publication on Continuity Central. Simply e-mail editor@continuitycentral.com

You have subscribed to this newsletter. To unsubscribe visit:
http://www.continuitycentral.com/index.php/unsubscribe or e-mail webmaster@continuitycentral.com

This email was from:
Portal Publishing Ltd, PO Box 1393, Huddersfield, HD1 9TN, UK, Tel: +44 1484300750