Posts

Showing posts from July, 2018

WHO’S WATCHING YOU????

WHO’S WATCHING YOU???? Over the last 10 years, we have witnessed massive changes in the embedded Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), DCS and Physical Security (CCTV, access controls and alarms) sectors, with the adoption of IP-capable technologies through the Internet of Things (IoT) and now the Internet of Everything (IoE). However, the mindset of the creators and users of many of these technologies has not always included a coherent focus on securing them against interior and exterior breach. While some of these technologies do contain security features, many are not as developed and robust as those found in the areas of IT and networking. Additionally, the business areas using these technologies are not always accustomed to the high levels of risk associated with connecting these systems to the Internet, thereby neglecting the adoption and application of adequate and appropriate levels of IT/cyber security. Download full pap

CYBER SECURITY

What is cyber security? Cyber security comprises technologies, processes and controls that are designed to protect systems, networks and data from cyber attacks. Effective cyber security reduces the risk of cyber attacks, and protects organisations and individuals from the unauthorised exploitation of systems, networks and technologies. What are the consequences of a cyber attack? Cyber attacks can disrupt and cause considerable financial and reputational damage to even the most resilient organisation. If you suffer a cyber attack, you stand to lose assets, reputation and business, and potentially face regulatory fines and litigation – as well as the costs of remediation. The UK government's Cyber Security Breaches Survey 2017 found that the average cost of a cyber security breach for a large business is £19,600 and for a small to medium-sized business is £1,570. Start your journey to being cyber secure today IT Governance offer a range of products and serv