Last week the chief of Lloyds of London claimed that his business had seen a 50% increase in demand for cyber insurance products in the first quarter of 2015. The UK government working in partnership with insurance broker Marsh in Marsh has highlighted that around 98% of large UK companies have no form of insurance against a data breach or cyber-attack.
WALLIX
Recent Posts
Cyber insurance is here, but will it reward good security?
[fa icon="calendar'] Apr 23, 2015 3:42:31 PM / by WALLIX posted in Mitigating External Attacks
Security analysts say bad password and user management puts businesses at risk of an insider attack
[fa icon="calendar'] Apr 14, 2015 12:12:36 PM / by WALLIX posted in Mitigating External Attacks
What do you think poses the biggest insider risk in your business? There’s no doubt that the Snowden case has highlighted the danger posed, particularly by those users with elevated privileges and access to sensitive and valuable data.
Might your system administrator have a god complex?
[fa icon="calendar'] Apr 13, 2015 10:48:24 AM / by WALLIX posted in Mitigating External Attacks
Here in London the TimeOut magazine is a must read (they also have an awesome blog). One of my favourite weekly features is the hilarious and regularly cringe-worthy: “Overheard in London” #wordonthestreet.
4 signs your IT worker may have gone rogue
[fa icon="calendar'] Mar 30, 2015 1:24:00 PM / by WALLIX posted in Reaching IT Compliance
The technology being used in today’s businesses is more powerful than ever. These tools and systems are helping to increase productivity and drive digital transformation. But this increased visibility of IT and its key part in business now sees it under greater scrutiny, especially when it comes to trusting those with access to this now critical infrastructure.
VIDEO: Approval workflows for painless privileged user management
[fa icon="calendar'] Mar 19, 2015 1:03:05 PM / by WALLIX posted in WALLIX Products
How often do you need to allow one of your external service providers to access one of your critical resources or temporarily increase the privileges of someone in your IT team?