Bringing in the professionals to deal with a crisis
The first thing companies need to do is ascertain that it is actually a crisis, and not a blip
The first thing companies need to do is ascertain that it is actually a crisis, and not a blip
Keeping on top of new regulations can be overwhelming, but they are essential and will in time be of benefit to all companies
An ever more complex and aggressive cyberthreat landscape makes dynamic, proactive corporate strategies essential
Simple protection, including multi-factor authentication, regular infrastructure scanning, encryption and education, doesn’t have to cost a lot
GenAI makes things easier for cybercriminals but it also allows organisations to speed up detection and bolster their cyberdefences
It can be challenging for Irish companies to stay ahead of emerging cyber threats but there are some great tech resources available
The first line of defence for smaller businesses, and one of their key cybersecurity resources, is their staff
Cyber risks come in all shapes and sizes but the outcomes for enterprises are all depressingly similar – loss of money, business or reputation
Both the risks to your business and the law mean cybercrime requires a whole-of-organisation approach
The cyber-Achilles heel of most organisations is their own employees. Here’s what businesses can do about it
With cybersecurity the fastest growing area in tech, now is the time for professionals to upskill
Wider cloud adoption by businesses plus the rise of GenAI means an increase in opportunities and capabilities for bad actors
In order to have a fully thought out crisis response for attacks, organisations need to be preparing for the worst to minimise fallout
For most organisations, staff represent the first and last line of defence, which is why cyber awareness training is vital.
From basic antivirus software to sophisticated network monitoring tools, we look at technology solutions available to companies looking to improve their cyber defences
Ensuring the organisation is protected while employees work from home costs money, however the cost is minimal compared with that arising from a successful cyber attack
Change, compliance, cost, continuity, and coverage: five things to keep in mind when planning your cybersecurity strategy
Fraudsters often seek to exploit multiple potential vulnerabilities, both technical and non-technical, by targeting people to divulge sensitive information
What can organisations do to defend against cyber attacks without a massive disruption to the business?
Some businesses believe their small size means they will escape the notice of cybercriminals while big ones can fall into a false sense of security believing the size of their cyber budgets will render them immune to attacks. But there is no target too big or small for cybercriminals
Cyber threats can come from a variety of sources, including individuals, criminal organisations, and nation-state actors
The rise of generative AI and its use to craft more sophisticated and quicker, larger-scale attacks continues to evolve
It is critical for business leaders and cybersecurity teams to engage and develop a flexible resilience strategy ahead of time rather than testing it in the middle of a crisis
It is estimated that employment in the sector will grow at 10% per annum
No organisation is too small to escape the notice of cybercriminals.
While gold standard cyber defences may be beyond the reach of many SMEs, there are some simple steps they can take to protect themselves and deter criminals
A third-level qualification in the fields of IT, networking, business information systems, law and technology or computer forensics is recommended
Is it right in any circumstances to negotiate with cybercriminals and pay a ransom
Every individual, enterprise and organisation that has data is at risk from cybercrime
Is there a typical cybercriminal profile or do multiple profiles exist?
Which technologies are here to stay and which are a flash in the pan?
It’s helpful to organise cybersecurity training around a theme that is communicated regularly
More significant attacks taking place that have motivations other than financial
Technologies are being developed that will allow software to mitigate vulnerabilities by themselves
Cyber security was previously seen as a financial services issue but other industries are now being increasingly targeted.
Remote employees must avoid “cross-contamination” by maintaining the separation of work and personal usage
Crosswords & puzzles to keep you challenged and entertained
Inquests into the nightclub fire that led to the deaths of 48 people
How does a post-Brexit world shape the identity and relationship of these islands
Weddings, Births, Deaths and other family notices