Serviceteam IT Security News

B3. Data security

Principle Data stored or transmitted electronically is protected from actions such as unauthorised...
Serviceteam IT Security News

Objective D: Minimising the impact of cyber security incidents

Principles under this Objective D1. Response and recovery planning Putting suitable incident management...
Serviceteam IT Security News

The principles of supply chain security

Introduction The guidance will provide organisations with an improved awareness of supply chain...
Serviceteam IT Security News

C1. Security monitoring

Principle The organisation monitors the security status of the networks and systems supporting...
Serviceteam IT Security News

Objective C: Detecting cyber security events

Principles under this Objective C1. Security Monitoring Monitoring to detect potential security problems...
Serviceteam IT Security News

B2. Identity and access control

Principle The organisation understands, documents and manages access to systems and functions supporting...
Serviceteam IT Security News

A1. Governance

Principle The organisation has appropriate management policies and processes in place to govern...
Serviceteam IT Security News

Objective B: Protecting against cyber attack

Principles under this Objective B1. Service protection policies and processes Defining and communicating...
Serviceteam IT Security News

NIS Directive: Top-level objectives

Introduction The implementation of Article 14 of the NIS Directive is described via...
Serviceteam IT Security News

Supply chain security collection

Proposing a series of 12 principles, designed to help you establish effective control and...
Serviceteam IT Security News

III. Check your arrangements

  10. Build assurance activities into your supply chain management Require those suppliers who...
Serviceteam IT Security News

Objective A. Managing security risk

Principles under this Objective A1. Governance Putting in place the policies and processes...
Serviceteam IT Security News

IV. Continuous improvement

  11. Encourage the continuous improvement of security within your supply chain Encourage your...
Serviceteam IT Security News

B1. Service protection policies and processes

Principle The organisation defines, implements, communicates and enforces appropriate policies and processes that...
Serviceteam IT Security News

Introduction to the NIS Directive

General Introduction What does the NIS Directive cover and when will it...
Serviceteam IT Security News

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners

Lenovo said nearly a dozen ThinkPad and ThinkCentre laptops contain a hardcoded password...
Serviceteam IT Security News

Firefox, Chrome Patch Vulnerabilities, Add Security Features

Dueling browsers, Mozilla Firefox and Google Chrome, have patched bugs and beefed up...
Serviceteam IT Security News

Skype, Slack and Signal Vulnerable to Critical Framework Bug

The team behind the popular open-source framework Electron warns a remote code execution...
Serviceteam IT Security News

Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems

Widespread reports of reboot issues on some Intel systems force the chip giant...
Serviceteam IT Security News

Introduction to identity and access management

Introduction If identity and access management procedures and controls are badly designed or...
Serviceteam IT Security News

CYBERUK 2018

Registration is now open for the NCSC's flagship annual cyber security conference, which will...
Serviceteam IT Security News

Hacker Infects Gas Pumps with Code to Cheat Customers

Russian authorities have broken up a crime ring involving a hacker and willing...
Serviceteam IT Security News

OnePlus Confirms Credit Card Breach Impacted Up to 40,000 Customers

The breach is the latest piece of bad publicity for the popular Chinese...
Serviceteam IT Security News

New Dridex Variant Emerges With An FTP Twist

A recently discovered Dridex campaign had a few peculiar characteristics, including the use...
Serviceteam IT Security News

Apple Preps ChaiOS iMessage Bug Fix, Report

A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that...
Serviceteam IT Security News

Sprawling Mobile Espionage Campaign Targets Android Devices

A massive mobile espionage campaign has been collecting troves of sensitive personal information...
Serviceteam IT Security News

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips

Intel says its firmware updates for Meltdown and Spectre are causing additional reboots...
Serviceteam IT Security News

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware

Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware...
Serviceteam IT Security News

Oracle Ships 237 Fixes in Latest Critical Patch Update

Enterprise applications from Oracle and others could be becoming juicier targets for attackers....
Serviceteam IT Security News

Potent Skygofree Malware Packs ‘Never-Before-Seen’ Features

Researchers have discovered Android malware with spy capabilities never seen before such as...