10 Things You Might Not Know About Cyber Essentials

 

IASME delivers Cyber Essentials on behalf of UK NCSC

By Sam Jones | Cyber Tec Security and Dave Whitelegg
What is Cyber Essentials? If you are just hearing about the Cyber Essentials scheme, read on as we unpack 10 things you might not … Continue reading 10 Things You Might Not Know About Cyber Essentials

Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies

The Colonial Pipeline is critical infrastructure—of that there’s no doubt. But ransomware scrotes have crippled it.
The post Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies appeared first on Security Boulevard.
Continue reading Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies

Of Pipelines And Cybersecurity

One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one of the most dangerous substances we encounter every day. R… Continue reading Of Pipelines And Cybersecurity

Cybersecurity and Compliance for Healthcare Organizations

Amidst the pandemic overwhelming the capacity of many hospital systems, malicious hackers have been quick to target healthcare providers and medical agencies. These cyber-attacks have hit both the United States and Europe in recent months, serving as a… Continue reading Cybersecurity and Compliance for Healthcare Organizations

Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

Colonial Pipeline reported a cyber-attack that resulted in a halting of their fuel pipeline operations to the East Coast per sources including this Bloomberg article originally posted on May 8, 2021. Just days before the U.S. National Security Age… Continue reading Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

OT and IoT Security: Adopt a Post-Breach Mindset Today

Every time there’s a cyberattack like the recent ransomware targeting Colonial Pipeline, industry experts scramble to share thoughts on what could have been done to thwart it, or what the impact of a breach could be. Organizations need to reset themsel… Continue reading OT and IoT Security: Adopt a Post-Breach Mindset Today

Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

A high-severity bug affects almost 40% of Android phones. The security hole is in Qualcomm modems.
The post Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability appeared first on Security Boulevard.
Continue reading Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

The Security Industry is Protecting the Wrong Thing

When the security industry talks about a data breach, often the first question asked involves the state of the victim’s network security – not the breach of data. Why is this? It’s because organizations have their security priorities… Continue reading The Security Industry is Protecting the Wrong Thing

Achieving PCI DSS Compliant Firewalls within a Small Business

The most important and integral part of any data security begins with having firewalls installed in the environment. Not just that, installing firewalls is an essential requirement of the Payment Card Industry Data Security Standard (PCI DSS). However… Continue reading Achieving PCI DSS Compliant Firewalls within a Small Business

Cybersecurity Is Not A One-Stop-Shop

Cybersecurity is not a One-Stop-Shop

Boris Johnson announced the Government’s roadmap to lift Coronavirus restrictions for both businesses and the general public earlier in February, and since then, this has provided a glimmer of hope for man… Continue reading Cybersecurity Is Not A One-Stop-Shop