The Insider Threat: Strategies to Safeguard Against Malicious Insiders

The Insider Threat: Strategies to Safeguard Against Malicious Insiders

Your biggest security threat may be hiding in plain sight: your employees. No business can operate without trusting its people. Without access to confidential information and essential systems, staff can’t perform their roles. But if an insider turns malicious, regardless of their motivation, they can significantly damage your organisation. After all, their account is supposed to have access to sensitive data! So, how can your organisation protect itself from malicious insiders? Our head of security testing, James Pickard, explains. In this interview Insider threat vs insider risk Do you consider accidental breaches caused by staff, like clicking a phishing link,
The post The Insider Threat: Strategies to Safeguard Against Malicious Insiders appeared first on IT Governance UK Blog.

Read More
3 ISO 27001:2022 Controls That Help Secure Your Cloud Services

3 ISO 27001:2022 Controls That Help Secure Your Cloud Services

Cloud computing is a key tool for business everywhere: In short, you gain access to technical services and functions you may not have internally. Particularly for smaller organisations, this brings huge benefits. For one, you can access your information from anywhere. The trouble is – how do you restrict that access to authorised users only? Plus, Cloud environments are increasingly complex. This increases your attack surface and makes vulnerabilities more likely. To protect data in the Cloud, you must take the same kinds of precautions as you would with information held elsewhere. That means implementing appropriate controls. Which controls, you ask?
The post 3 ISO 27001:2022 Controls That Help Secure Your Cloud Services appeared first on IT Governance UK Blog.

Read More
Security Risks of Outsourcing to the Cloud: Who’s Responsible?

Security Risks of Outsourcing to the Cloud: Who’s Responsible?

Cloud computing is a key tool for organisations, offering a wealth of opportunity to extend IT capabilities and take advantage of innovations. As more organisations move to remote or hybrid working, Cloud services are more valuable than ever. However, innovation comes with risk. In this blog Security challenges of the Cloud During the COVID-19 lockdowns, IT teams were under pressure to integrate existing networks with Cloud services, implementing remote-working solutions and technologies hastily. Further reading: Senior penetration tester Leon Teale gives his top security tips for remote working in this interview. And as infrastructures become more complex, often in a
The post Security Risks of Outsourcing to the Cloud: Who’s Responsible? appeared first on IT Governance UK Blog.

Read More
What Are ISO 27017 and ISO 27018, and What Are Their Controls?

What Are ISO 27017 and ISO 27018, and What Are Their Controls?

Extending your ISMS to address Cloud security risks ISO 27001 sets out the specification – the requirements – for an effective ISMS (information security management system). But did you know you can extend your ISO 27001 ISMS to cover specific aspects of Cloud security? Two ISO standards in particular stand out: Let’s take a closer look at both ISO 27017 and ISO 27018. Note: The current versions of ISO 27017 and ISO 27018, ISO/IEC 27017:2015 and ISO/IEC 27018:2019, are aligned to the previous (2013) edition of ISO 27002. The new (2022) control set has been completely reorganised, and 11 new
The post What Are ISO 27017 and ISO 27018, and What Are Their Controls? appeared first on IT Governance UK Blog.

Read More
X