With the first quarter of the calendar year now passed, the industry is buzzing with announcements, events and more. This BizTech Brief summarises and condenses all the biggest and latest content from the It industry into one place.
More organisations have joined an anti-ransomware cross-industry initiative, boosting its capacity to help victims of ransomware as attackers begin to focus on business targets.
Ransomware is a proven business model that will remain popular with attackers as long as victims continue to pay unless there is more education around the subject, according to David Emm, principal security researcher at Kaspersky Lab.
No More Ransom, which is also aimed at informing the public about the dangers of ransomware. The project is an example of cyber security experts uniting around a common purpose and represents a new level of co-operation between law enforcement and the private sector around fighting ransomware.
In the nine months since its launch, more law enforcement and private partners have joined, eight languages have been added to bring the total to 14 and 15 decryption tools have been added to bring the total to 39.
We may be leaving the EU, but some EU law – with significant consequences for the IT community – will carry on. One such is the General Data Protection Regulation (GDPR).
We signed up to it before the referendum, agreed to persist with it after and, if businesses wish to continue to process data belonging to EU firms, as well as avoid some potentially eye-watering fines, they need to be compliant with the GDPR no later than May 2018.
And yet a March survey of IT decision makers in UK companies by information management firm Crown Records Management found an extraordinary 44 per cent believe GDPR will not apply to UK business after Brexit.
Twenty-four per cent are no longer preparing for it, while some 4 per cent have not even begun to prepare.
"The risk to businesses of not being compliant in time is significant. Our advice to all businesses is to prepare now, as it will take time to fully implement the systems and processes required," Rachel Aldighieri, managing director of the Direct Marketing Association said.
ComputerWorld shortlisted for a CRN Award for 2nd year in a row
In 2016 the ComputerWorld team were shortlisted and awarded 'Best online innovation or website' at the CRN sales and Marketing Awards. The team won this award for their innovative blog and event brand 'Define Tomorrow'. This site is where the ComputerWorld team blog and share their expert knowledge about the latest technology announcements or about any technical issues they come across.
The team have now been now been lucky enough to have been shortlisted for the 'Best digital marketing innovation' award at the CRN Sales and Marketing Awards 2017. This year the team have been nominated for their new microsite focused on Office 365. This site makes it easier to understand the journey of migrating to Office 365 by clearly highlighting the different areas such as: Cloud Migration, data protection, training and more.
A sizeable proportion of security professionals do not know how their organisation is addressing cyber threats hiding in encryption.
Cyber attackers are increasingly using encryption to hide their activities, but nearly a quarter of security professionals admit they are blind to this threat, a survey has revealed.
Security firm Venafi polled 1,540 information security pros about their organisations’ capability to defend against threats hiding in encrypted communications.
Some 23% said they had no idea how much of their encrypted traffic was decrypted and inspected, and 17% said they did not know how much of their traffic was encrypted.
However, 41% said they encrypted at least 70% of their internal network traffic, and 57% said they encrypted 70% or more of their external web traffic, indicating that the proportion of encrypted traffic flowing into and out of organisations is growing.
Gartner predicts that in 2017, more than half the network attacks targeting enterprises will use encrypted traffic to bypass controls to sneak malware into organisations and exfiltrate data undetected.