SME Cyber Security
83.3K views | +1 today
Follow
 
Scooped by Roger Smith
onto SME Cyber Security
Scoop.it!

5 steps to cyber security | SMEInsider

5 steps to cyber security | SMEInsider | SME Cyber Security | Scoop.it
The rapid pace of change in technology and corporate culture makes cyber security increasingly tricky, especially for SMEs that have limited resources to invest.
more...
No comment yet.
SME Cyber Security
Your new post is loading...
Your new post is loading...
Scooped by Roger Smith
Scoop.it!

Many companies are not GDPR-compliant: report

Many companies are not GDPR-compliant: report | SME Cyber Security | Scoop.it
Strengthening cyber security while managing operational risk and compliance are two biggest priorities...
Roger Smith's insight:

The numbr of SME’s who are not compliant is even higher.  Compliance streamlines an organisaion allowing it to grow with a stable environment and not have to have knee jerk reactions to every piece of bad digital news.   SME’s are still focused on “she’ll be right”

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

i-Tech: DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide

i-Tech: DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide | SME Cyber Security | Scoop.it
DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide Widespread routers' DNS hijacking malware that recentl
Roger Smith's insight:

I love it when you point out an issue with the digital world and get howled down, only to be vidicated because the bad guys have shown how it can be done.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Maker of iPhone Hacking Tool Suffers Data Breach, Extortion Threats

Maker of iPhone Hacking Tool Suffers Data Breach, Extortion Threats | SME Cyber Security | Scoop.it
Grayshift, the company that makes an iPhone hacking tool called GrayKey, is already being targeted by malicious entities.Last week, unknown attackers leak...
Roger Smith's insight:

I am clever enough to be able to by pass apple iphone security but do not worry about their own supply chain.   FAIL

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How can lawyers find cybersecurity solutions that work for them?

How can lawyers find cybersecurity solutions that work for them? | SME Cyber Security | Scoop.it
Description...
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

NHS is “not alone” in its inertia post-WannaCry, says cybersecurity chief

NHS is “not alone” in its inertia post-WannaCry, says cybersecurity chief | SME Cyber Security | Scoop.it
“The Public Account Committee’s report into the NHS WannaCry cyber-attack highlights a lack of preparedness for attacks of this nature, but the NHS is not alone in this,” said Andrew Beckett, managing director of Kroll’s cyber security and investigations division.
Roger Smith's insight:

Patching  is one of the best protections

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyber Accountability: The Next Boardroom Struggle

Cyber Accountability: The Next Boardroom Struggle | SME Cyber Security | Scoop.it
Working in cyber security means reaction and flux. The reality of the role is responding to an ever-changing landscape of cyber threats that are increasing.
Roger Smith's insight:

The change in board room management of cyber events needs to be addressed especially with GDPR.   This explains some of the changes that need to be addressed at the board level

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

China's "Social Credit System" Rates How Valuable You Are as a Human

China's "Social Credit System" Rates How Valuable You Are as a Human | SME Cyber Security | Scoop.it
China's plans for a "social credit system" are in full swing. The government has already tapped private companies for pilot runs
Roger Smith's insight:

This is truly frightening!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

You have no secrets

You have no secrets | SME Cyber Security | Scoop.it
— Google knows. The tech giant knows that I watched Peaky Blinders on Netflix last Friday night, chatted with some friends on Facebook, and then streamed some NCAA basketball without paying for it.
Roger Smith's insight:

A very thought provoking article on privacy and personal protection

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyber security strategies: What does good look like?

Cyber security strategies: What does good look like? | SME Cyber Security | Scoop.it
It’s easy to feel helpless in the face of endless cyber threats, but you can protect yourself. Here’s where to start.
Roger Smith's insight:

This is a good read -


“A cyber security strategy is required for reputation’s sake, for moral peace of mind, and with the introduction of GDPR on the 25th of May 2018, as a matter of law”

more...
Cyber Security News 24/7's curator insight, April 2, 10:19 AM

This is a good read -


“A cyber security strategy is required for reputation’s sake, for moral peace of mind, and with the introduction of GDPR on the 25th of May 2018, as a matter of law”

Scooped by Roger Smith
Scoop.it!

Five Benefits GDPR Compliance Will Bring To Your Business

Five Benefits GDPR Compliance Will Bring To Your Business | SME Cyber Security | Scoop.it
The EU's new regulations may bring challenges, but they also present an enormous opportunity.
Roger Smith's insight:

GDPR is just around the corner.   Embracing the program will definately improve your bottom line!


this explains it well

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Cyberheroes: An Opportunity We Can’t Afford to Ignore

Cyberheroes: An Opportunity We Can’t Afford to Ignore | SME Cyber Security | Scoop.it
Cisco Networking Academy expands its offerings to bridge the cybersecurity workforce gap.
Roger Smith's insight:

I think this is a good idea, how about you?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

How ISO 27001 and ISO 22301 can help keep your organisation secure –

How ISO 27001 and ISO 22301 can help keep your organisation secure – | SME Cyber Security | Scoop.it
Most organisations will do anything within their budget to prevent cyber attacks, but senior staff are often given conflicting advice on where to spend their money. Should they invest in the latest…
Roger Smith's insight:

Not just English based organisations, this should be world wide!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Best Cyber Security Practices for Your Company

Best Cyber Security Practices for Your Company | SME Cyber Security | Scoop.it
Think about your business. Is your most sensitive data totally secure? If it’s not, it’s time to step it up.
Roger Smith's insight:

Easy to understand strategies, will make your organisation more secure

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

BMW cars found to contain more than a dozen flaws

BMW cars found to contain more than a dozen flaws | SME Cyber Security | Scoop.it
China-based researchers are working with the carmaker to patch the security problems.
Roger Smith's insight:

Only BMW's, I don't think so!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

5,000 Routers With No Telnet Password. Nothing to See Here! Move Along!

5,000 Routers With No Telnet Password. Nothing to See Here! Move Along! | SME Cyber Security | Scoop.it
A Brazilian ISP appears to have deployed routers without a Telnet password for nearly 5,000 customers, leaving the devices wide open to abuse.
Roger Smith's insight:

A- what is wrong with manufacturers?


B- why is security the last thought?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Phishing is the leading cause of cyber attacks –

Phishing is the leading cause of cyber attacks – | SME Cyber Security | Scoop.it
Criminal hackers are starting to rely more heavily on nuanced social engineering attacks such as spear phishing, a new study has found.The 2018 Trustwave Global Security Report shows that phishing…...
Roger Smith's insight:

Still targeting the weakest link - US

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Nine Things That Are Poised To Impact Cybersecurity

Here's what's being developed to protect your organization.
more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Survey says: Many breaches accomplished in less than an hour

Survey says: Many breaches accomplished in less than an hour | SME Cyber Security | Scoop.it
Penetration testers and hackers are having little problem breaching the perimeter and quickly locating critical data with 12 percent saying they can get in
Roger Smith's insight:

"Fifty-seven percent of the testers and hackers surveyed did note that those companies that are in compliance with PCI, NIST and ISO 27001 are better protected, calling all three defensive measures effective."

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Facebook Is Not The Only Company Watching You

Facebook Is Not The Only Company Watching You | SME Cyber Security | Scoop.it
Facebook isn’t the only company that’s had trouble with authorities over breaches of privacy.
Roger Smith's insight:

I was wondering when the others were going to be mentioned in this.   Google and Android are collecting more information and using it in their algorithyms, maybe they are not selling it?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Atlanta's Boring Ransomware Cyberattack

Atlanta's Boring Ransomware Cyberattack | SME Cyber Security | Scoop.it
A recent ransomware attack on Atlanta’s computer systems is disruptive, but so ordinary.
Roger Smith's insight:

Nice, a sarcastic look at an everyday computer failure.   Is it all so normal?

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Should Companies be Fined for Poor Cyber Security? »

Should Companies be Fined for Poor Cyber Security? » | SME Cyber Security | Scoop.it
Companies in the UK are being fined by the government for not properly securing their data. Is this a model the U.S. and other countries should adopt? News broke recently that there would be fines of up to £17m in the UK for companies that have poor or inadequate cyber security measures in place. Specifically, if a
Roger Smith's insight:

Why is this even a question.

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Internet of insecure Things: Software still riddled with security holes • The Register

Internet of insecure Things: Software still riddled with security holes • The Register | SME Cyber Security | Scoop.it
Which means devices could be pwned by crooks
Roger Smith's insight:

Until this is addressed at an organisational level we will continue to have security issues with IOT

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Three Pressing Cyber Threats for IoT in 2018 - Digital Doughnut

Three Pressing Cyber Threats for IoT in 2018 - Digital Doughnut | SME Cyber Security | Scoop.it
Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersecurity space. 2018 will be no different. Here are three pressing cyber threats to IoT devices that we believe enterprises need to be aware of.
Roger Smith's insight:

This will make you think!

more...
No comment yet.
Scooped by Roger Smith
Scoop.it!

Unsecured N.Y. medical practice server exposes 42,000 records

Unsecured N.Y. medical practice server exposes 42,000 records | SME Cyber Security | Scoop.it
A Long Island, N.Y. medical practice left an exposed port normally used for remote synchronization open exposing at least 42,000 medical records.
more...
No comment yet.