This month Microsoft have released an update for Windows Remote Desktop to patch a significant vulnerability - the vulnerability allows an attacker to remotely run code on any unpatched machine without any need to log in.
Increasingly aware of the growing threat that cybercrime poses to private businesses and public organisations alike, governments around the world have begun implementing legislation geared towards counteracting it. One of the first to do so was the USA, which brought in the original version of its Cybersecurity Framework in February 2014, initially aimed at critical infrastructure providers.
Health and safety has always been of paramount concern in the workplace – especially in the industrial sector – but the way it is monitored, regulated and complied with is changing. The increasing ubiquity of the digital transformation means that more and more of our business transactions, correspondences and processes are taking place online and via automation, which is advantageous for a whole host of efficiency, budgetary and quality benefits.
With all the furore surrounding the introduction of GDPR earlier this year, another EU edict has comparatively flown under the radar. Nonetheless, the NIS Directive was apparently discussed in the European Parliament on far more occasions than the new data protection act (77 mentions compared to GDPR’s 13) in 2016 and 2017, signalling the importance placed on the subject by Europe’s elite politicians and lawmakers.
Cyber-criminals are outspending businesses by a factor of more than ten to one, according to new data supplied by the World Economic Forum (WEF) and the Centre for Strategic and International Studies (CSIS). The two international watchdogs estimate that hackers are investing as much as $1 trillion (£768.5 billion) in finding new ways to breach online defences.
The first port of call when improving any existing security infrastructure is assessing its current state of proficiency. Recognising areas where the status quo is working well will allow you to devote the requisite time and resources to patching up areas where it isn’t.
With more and more of our interactions and transactions now taking place online, it’s no surprise that cyber-crime is growing by the day. Opportunistic hackers will seek any opportunity to infiltrate your company’s network and access its sensitive information – and the methods employed to do so are evolving and adapting all the time.