NAO slams Cabinet Office for lack of leadership in information security

— A fresh report from the National Audit Office says the Cabinet Office has failed to get to grips with information security across government departments. Full Story

NAO report slates the Cabinet Office’s cyber security efforts

— Poor communications, no consistent central governance and little assessment of performance, watchdog finds. The UK government's approach to IT security has been roundly criticised by spending watchdog the National Audit Office (NAO). In a report entitled Protecting Information Across Government the NAO paints a picture of a fragmentary approach to IT security across government bodies. Full Story

10 Steps to Implementing Chat Support

— Chat support software can be a powerful tool for offering efficient help from a company website or facilitating staff communication. Studies confirm that chat is both a cost effective and user-friendly tech support channel, but too many organizations add chat without proper planning or have yet to implement it at all. Incorporating a chat capability into tech support can be a daunting task, but continuing to rely on email and phone as primary support channels is not a comprehensive solution Full Story

Ransomware on the rise

— Public infrastructure bodies have never been more vulnerable to cyber threats. Cybersecurity firm SentinelOne discovered that 23 out of the 58 UK universities questioned had been held to ransomware. Bournemouth University, which has its own cyber security centre, was hit 21 times this last year. Full Story

5 Easy Things Channel Partners Can Do to Protect Customers Against SMB Security Threats

— Most large enterprises are painfully aware of their security vulnerabilities and are proactively working to mitigate risks. But recent research has proven that small and midsize businesses (SMBs) don’t fully recognize how high the likelihood is that they’ll suffer an attack or the business implications surrounding such vulnerabilities. Moreover, they’re not fully aware of all of the facets of a well-rounded cyber defense. These days, it’s about way more than firewalls and antivirus software. Full Story

Are unsecure medical devices opening the backdoor for hackers?

— The increased adoption of connected devices into medical services and processes, is streamlining and improving the manner in which medicine can be tracked, developed, sourced and distributed. On call/off site medical staff are also able to access information and source medicine on site, improving service levels and productivity. However the exponential advantages of integrating connected devices into this industry can potentially open up points of vulnerability which should increase security fears for decision makers. Full Story

New products of the week 8.1.16

— Privileged Access Management empowers professionals to control, monitor and manage privileged users’ access to critical systems. PAM 16.1 includes new features like 3D Touch and Touch ID support for iOS. Full Story

Five Lessons for Good Airport Security Practices

— Many people love living in the Tampa area for a lot of reasons, among them of course is having access to regular use one of the most popular airports in the USA - Tampa International Airport (TIA). Unfortunately for the people that run TIA, they experienced an IT security breach as reported in May. However, unlike a lot of the other organizations, because it is an international airport, the profile of the breach was far higher because of its security status. Full Story

Credit card security breached at local Cicis restaurants

— More than 130 Cicis Pizza locations, including Waco’s at 1609 N. Valley Mills Drive, Bellmead’s at 910 North Loop 340, Suite 4, and Killeen’s at South Fort Hood Street, have suffered a security breach that could compromise information on payment cards used at the stores, the company announced Monday. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation