Our 2015 Business Continuity Review – Cloudy with Scattered Security Breaches
Information security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
When the Resilience of the Web Comes Back to Haunt You
The Internet is truly a work of genius. From the original DARPA brainwave about a network that would reroute around failure to the social media that have brought billions of people together, the Internet is a wonder of the world as much as the Egyptian pyramids and the Taj Mahal. It is a fascinating thought […]
Smart Power, Cheap Power… Safe Power? Smart Grids and Resilience
They say that information drives business. Actually, it’s electricity. Your data will most likely be useless if you have no power. On the other hand, if you can turn the lights on, you can start working, one way or another. But now in a kind of millennial Mobius loop, information is also increasingly driving power […]
Data Snooping and Privacy – Is There a Pilot in the Plane?
The data snooping debate has quietened down a little recently, even if Edward Snowden’s name still crops up here and there. Whether or not the revelations about intelligence activities have changed much in terms of governmental attitude and behaviour remains to be seen. Pressure can still be applied to Internet, cloud and telecommunications service providers […]
Risk, Business Continuity and IT DR – the Year of 2013 in Review
Risk certainly marked the year of 2013, with knock-on effects on business continuity thinking. However, in a year picking up the pieces after different disasters, the real message was a reminder that while we collectively now know a great deal about risk, we don’t always prepare or take action appropriately. The devastation caused by rainfall […]
How Well Does Your Company Password Policy Perform?
If you haven’t seen it, you’ve probably heard about it: the sticky note on the computer screen with the account login and password for all to see. While this archetypally bad behaviour has security officers recoiling in horror, there are also other less obvious forms of password vulnerability that affect many organisations. Fundamental problems that […]