Folder Information security

Documents

default How a business continuity plan can help you survive a ransomware attack Popular

By 2113 downloads

Paying a ransom is not the way to deal with a ransomware attack; instead comprehensive business continuity and disaster recovery planning provides the best solution says Paul Barber.

default How do you know when your technology architecture is SASE ready? Popular

By 176 downloads

Many organizations are turning to secure access service edge (SASE) to help ensure cyber resilience while enabling safe remote working and effective digital transformation. Michael Wood provides some advice for organizations looking to start their SASE journey.

default How do you protect your perimeter when you’ve blown it to pieces? Popular

By 2327 downloads

Without knowing it, many organizations have repeatedly punched holes into their once-secure perimeter says Ian Kilpatrick. While security is no longer mainly about perimeter protection, it is still a vital element…

default How to protect backups from ransomware Popular

By 260 downloads

Until recently the standard advice was to turn to your backups to initiate a response to a ransomware attack. However, as attackers have adapted their techniques to target backups is this approach still feasible? Peter Groucutt describes three ways of protecting backups to ensure that they can be used effectively after a ransomware attack.

default Hunting cyber threats: telltale signs and protocols Popular

By 2214 downloads

The quest to seek out cyber threats can seem an impossible task; but, like any mission, ultimate success begins with methodical planning and taking an intelligence-driven approach. It requires both patience and a determination to search where others may not think to look. By Tim Bandos.

default Incident response and establishing the hierarchy of data Popular

By 2456 downloads

Nick Pollard outlines the key steps that will help organizations not only understand the value of their data, but can also help to build a more risk-based and tailored incident response plan.

default Information security: why we should talk about incident response Popular

By 2529 downloads

Information security has become a fixture in the daily headlines, ranging from the latest high-profile data breach; to exotic hacks of USB drives, ICS devices and IOT systems; and new zero-day exploits and attack techniques. While these stories are interesting and help us understand the vulnerabilities and risks that make up the threat landscape, they reflect a frequent bias in the industry towards focusing on the ‘cool’ exploit and detection side of cyber-defense, rather than the more operational response and mitigation side. This article by Proofpoint considers the other side of the equation, looking at incident response and outlining four steps to success in this area.

default Keeping sensitive cloud data secure using machine-learning techniques Popular

By 1054 downloads

As organizations move growing volumes of data to the cloud, cyber security strategies need to be augmented with next-generation machine learning technologies that boost threat-protection capabilities says Anurag Kahol.

default Lessons from penetration testing: four simple IT security mistakes that leave a business vulnerable Popular

By 2243 downloads

Luke Potter looks at four of the most basic security oversights identified during penetration testing that leave businesses vulnerable to a data breach.

default Managing application connectivity securely through a merger or acquisition Popular

By 2294 downloads

Joe DiPietro looks at the challenges that IT faces during a merger or acquisition and provides practical advice on how to ensure the corporate networks maintain security during the process.

default Managing remote access risks Popular

By 2894 downloads

Various business continuity incidents - and even normal activities in the business calendar, such as bank holidays - can see a large rise in the number of workers connecting remotely; and this in itself can cause problems. In this article Guillermo Lafuente looks at the technologies that are available to help manage remote access requirements; and what security issues need to be considered.

default Network segmentation as a security technique: how to make it work for your organization Popular

By 1064 downloads

Whilst network segmentation is not a new approach, it is very relevant to assisting organizations protect themselves against cyber attacks. However, its implementation and long-term maintenance is a major challenge for many companies. In this article Andrew Lintell provides some useful pointers.

default No more excuses: cyber security must be a C-suite priority Popular

By 2297 downloads

By failing to embrace security expertise and innovation up front, businesses are incurring far too much risk. Adam Boone insists it is time make cyber security a priority for every C-suite…

default Overcoming barriers to becoming a security-first organization Popular

By 938 downloads

Taking a security-first approach involves prioritizing security in all areas of the business, including its people, processes and applications; and requires moving away from a simple ‘protecting the perimeter’ approach. Justin Calmus highlights four key areas that organizations need to consider when moving in this direction.

default Paper records represent a significant General Data Protection Regulation compliance risk Popular

By 2365 downloads

Businesses face significant challenges in applying the new EU Data Protection Regulation to paper records; Iron Mountain offers some advice.

default Plugging the virtual holes that Citrix and Terminal Servers create Popular

By 2269 downloads

Citrix and Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. It’s time for organizations to secure this potential threat vector.

default Practical zero trust in a real-world environment Popular

By 128 downloads

Zero trust is a popular talking point when it comes to security, however, in reality, end-to-end zero trust is not workable for the vast majority of modern businesses. Despite this, you can use the zero trust approach in a practical way in a real-world environment, argues Chris Cooper.

default Protecting business networks with the power of AI Popular

By 1024 downloads

Organizations may be tempted to dismiss artificial intelligence as something which is currently out of their reach, but Thorsten Kurpjuhn says that this is definitely not the case. In fact, AI can help businesses of all sizes to ensure network uptime and protection.

default Ransomware against the machine: how adversaries are learning to disrupt industrial production by targeting IT and OT Popular

By 662 downloads

Daniel Kapellmann Zafra, Keith Lunden, Nthan Brubake, and Jeremy Kennelly provide an update on ransomware which targets industrial production and critical infrastructure organizations.

default Ransomware: to pay or not to pay? That is the question Popular

By 2241 downloads

Gary Watson says that organizations should never get to the stage where they need to ask the above question. Combining data security with data protection can keep data safe and eliminate the need to pay ransoms.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.