Resources

Home Resources

Find whitepapers, video content and a whole host of great information about OpenSky UK.

Cyber Security Trends 2016

2016 will see an increasing number of attacks and the emergence of new targets. The complexity and sophistication of attacks, initiated by increasingly capable and technically well-equipped cyber criminals, will continue to rise.

In a world where 100% protection can’t be achieved, every organization, no matter its size, is a target. “It is even more important, beyond taking preventive measures, for organizations to be able to maintain or restart their operations as soon as possible after an attack. That requires organizations to have established a comprehensive set of security incident response processes ahead of time” according to Olaf Siemens, Chief Executive Officer of OpenSky and Executive Vice President of the Business Stream ICT & Business Solutions at TUV Rheinland, the parent company of OpenSky.

The good news is that, after years of checkbox compliance — which doesn’t keep you safe —organizations are beginning to focus the necessary resources on information security and risk management, especially as it is now firmly on the Senior Leadership’s agenda. This will give IT security leaders the opportunity to consider the following trends.

An Introduction to Cyber Business Risk by Nigel Stanley

Nowadays criminals have latched onto the power of the internet and are using the web to conduct their crimes. The reason? Simply that is where the money is. Much as being online is a way to conduct legitimate business, so it is being used to conduct criminal activities.

Information security, now dubbed cyber security, can be a complex subject as it can involve some very deep technical issues along with the complexities of people and processes. Key to success is ensuring confidentiality, integrity and availability of corporate data and systems.

The world is changing and so are cyber risks. We have already seen internet enabled baby alarms, medical devices, motor vehicles, mobile phones, TVs and fridges being subject to cyber-attack. While some of these attacks may seem trivial, some have had quite an impact on those affected. In a growing number of cases internet enabled “things” are being used as a backdoor route into corporate systems and data. No longer can corporate security finish at the factory gate.