By 2019, 1 to 2 million roles within cyber security will be unfulfilled. That’s a figure that should strike fear into the heart of even the most stoic of business people. The threat of cyberattacks is growing quickly, and there aren’t enough skilled people in place to control the wildfire.
This global cyber security skills crisis isn’t exactly a new problem, though. Over the last 2 years, 40% of cyber security roles remained unfulfilled, despite an increase in job postings of over 74%. This is a problem, then, that’s been smouldering in the background for a long time, and consequently now has the potential to create some serious destruction.
Continue reading “Cyber security expertise and the global skills gap”
76% of organisations are implementing the cloud or already operating in it. And no wonder: Cloud can do great things for your organisation. It can provide increased data storage capacity, improved business continuity, and potential cost reduction. However, using the cloud brings significant security risks with it, including data loss and threats to data privacy. Continue reading “Multi-cloud and security challenges”
Cyber security is more complex now than ever before, and the implications of a cyber-attack can be much more disastrous. Organisations must consider not only the financial implications but the reputational damage that can arise following an attack. The proliferation of social platforms and the increasing needs of regulation, mean that security breaches can be publicised across the globe within minutes. Whilst the cost of launching a cyber-attack has reduced over the last few years, the cost of defence has risen. This is because there’s a greater variety of attack vectors – means by which an attacker can gain access to your network. The methods deployed are so vast, compared to previously, that it makes it increasingly difficult to build an effective defence against. Highly sophisticated cyber-attacks are also using automation techniques to maximise their damage, to the extent where one piece of code can be used many thousands of times.
Continue reading “The changing faces of security”
The 2017 Thales data threat report presents the corporate view of security very well. And as any enterprise security team will tell you the report is entirely reflective of what they are having to live through.
Continue reading “Is security spending leaving data vulnerable?”
The adoption and proliferation of the Internet of Things (IoT) is unstoppable. Even though we have had massive DDoS attacks orchestrated using IoT, IP enabled CCTV Devices have been compromised and marshalled into a bot army of significant breadth and size; even though the implication of poor or shared cryptography of these IoT devices is well documented and a fantastic risk to any user/owner of these devices they are still being adopted.
Continue reading “The office kettle and your security estate”