Integrity360 launches Managed ASM to address complex attack surfaces and strengthen OT and IoT cyber resilience

Integrity360, one of the leading pan-European cyber security specialists, has announced the launch of its new Managed ASM service designed to address the growing complexities of securing diverse environments, including IT (Information Technology), Operational Technology (OT) and Internet of Things (IoT). The Attack Surface Management (ASM) service provides complete visibility into an organisation’s attack surface, enabling proactive risk reduction, exposure management, and threat detection to safeguard critical assets.

The attack surface is expanding at an unprecedented rate, with the number of connected assets worldwide expected to grow by an additional 50 billion devices by 2030. This surge, driven by the adoption of IoT, OT, and other connected technologies, has created new opportunities for cyber attackers to exploit poorly secured assets. Integrity360’s Managed ASM enables organisations to discover, prioritise, and remediate risks before they can be exploited.

According to Gartner, organisations prioritising continuous threat exposure management (CTEM) will be three times less likely to suffer a breach by 2026, highlighting the critical importance of the ASM service. Powered by the Armis Centrix Cyber Exposure Management (CEM) Platform, Integrity360’s Managed ASM leverages advanced automation and AI to discover and monitor all assets, identify exposures, and provide actionable recommendations for remediation.

“Integrity360’s Managed ASM provides organisations with a complete, end-to-end attack surface management solution,” said Jamie Andrews, Senior Director of International Partners at Armis. “By leveraging our platform’s AI-driven intelligence alongside Integrity360’s expert management and remediation services, businesses can stay ahead of evolving threats and maintain a proactive security posture across even the most complex environments.”

According to the National Institute of Standards and Technology (NIST), an organisation’s attack surface includes every point where an attacker can enter or extract data from a system spanning internal and external assets. Recent incidents, such as attacks targeting IoT-connected industrial devices, illustrate how adversaries chain exposures to access or disrupt critical systems or sensitive data.

With attack surfaces expanding across multiple infrastructures and a 140% increase in cyberattacks targeting critical infrastructure over recent years, the Managed ASM service responds to the urgent need for comprehensive visibility and proactive management.

The Managed ASM Service addresses several challenges faced by organisations, operating on a cyclical, continuous model to ensure constant improvement in security posture.*

The Managed ASM Service is tailored to help organisations reduce cyber risk by ensuring complete visibility, prioritising critical exposures, and supporting remediation efforts. This approach is especially vital for industries such as manufacturing, healthcare, and utilities, where compromised IoT and OT systems can lead to significant operational and safety impacts and aligns with specific compliance requirements for these critical sectors.

“Unlike traditional solutions that focus solely on IT infrastructure, Integrity360’s Managed ASM extends its capabilities beyond IT to also include OT, IoT devices, and even specialised systems like medical devices. These often-overlooked areas represent some of the most vulnerable entry points for attackers,” said Brian Martin, Director of Product Management, Integrity360. “What’s seen can be managed and secured. By providing granular visibility and continuous monitoring of the full attack surface, the service enables organisations to identify hidden risks across their entire environment and take proactive steps to address them.”

Integrity360’s Managed ASM emphasises the importance of collaboration through fortnightly customer review calls and provides transparency, enabling organisations to assess risk trends, review performance, and prioritise remediation efforts with support from Integrity360’s security experts. This partnership approach ensures continuous optimisation and alignment with the customer’s unique risk profile and allows customers to benefit from a scalable, proactive security framework.

For more information about Integrity360’s Managed ASM, visit https://www.integrity360.com/managed-asm.

Essential Security Awareness Training Tips To Stay Safe

Cyber threats are an ever-present danger in today’s increasingly digital world, making cyber security more crucial than ever. Security awareness training plays a pivotal role in protecting individuals and businesses from these threats by educating users on the risks and teaching them how to safeguard their information effectively.

Security awareness training takes a proactive approach to dealing with these threats. Instead of waiting for a security incident to happen and begin the contamination and eradication process, the goal is to make sure threats don’t occur in the first place.

It takes the form of a training program and can be taught in multiple ways, with the most common being the classroom setting. This article will look to explain the essence of cyber security training and provide actionable tips to make your training programs really stand out.

Why Cyber Security Awareness Training Matters

As cyber threats become increasingly sophisticated and damaging, the need for robust cyber security awareness training has never been more critical. Data breaches, phishing scams, and malware infections are just a few of the myriad threats that can lead to substantial financial losses and severe reputational damage. 

Importantly, human error often plays a significant role in these security breaches. Many incidents stem from simple mistakes, such as clicking on a malicious link or using weak passwords, underscoring the necessity of educating employees on how to recognize and mitigate risks effectively.

Moreover, the continuous evolution of cyber attacks demands that training programs are not static but are updated regularly to reflect new threats and tactics. Training empowers employees, arming them with knowledge to not only prevent attacks but also to respond swiftly and effectively if an incident occurs. 

This proactive approach to security can drastically reduce the potential impact of cyber threats on your organization. Therefore, investing in comprehensive cyber security awareness training is essential for maintaining the integrity and security of both data and systems in any modern organization.

Key Components of Effective Security Awareness Training

There are two main components to an effective security awareness training program. Those are:

  • Comprehensive Coverage: Security awareness training should cover all aspects of cyber security, from understanding the basics of internet safety to recognizing complex phishing emails and managing secure passwords. Training must be comprehensive, addressing everything from social engineering tactics to secure internet practices.
  • Regular Updates: Cyber threats are constantly evolving, which means that the information taught last year may already be out of date. Regular updates to training programs ensure that the material stays relevant and that trainees are aware of the latest tactics used by cybercriminals.

These two components ensure the training program contains all the elements necessary to protect your organization through education.

Actionable Tips for Implementing Security Awareness Training

Now, let’s get into the gist of it by outlining the five actionable tips to make your security awareness training program stand out. 

Assessing Your Needs

A successful security awareness program starts with a thorough assessment of your organization’s specific vulnerabilities. This initial analysis involves evaluating your existing security measures, identifying potential risks, and understanding the impact of various threats. For businesses handling sensitive customer data, the focus might be on techniques to prevent data breaches, such as securing databases and ensuring data is transmitted securely. 

For companies with customer-facing roles, training might emphasize the recognition and avoidance of social engineering tactics, which often exploit personal interactions to gain unauthorized access to information. It’s important to develop a training curriculum that addresses these identified risks with targeted, situation-specific advice.

Engaging Training Material

The effectiveness of any training program heavily relies on the interest it can generate among the participants. Traditional lecture-based approaches are often inadequate because they fail to engage learners effectively. To captivate and educate, incorporate interactive elements such as quizzes, games, and scenario-based activities. These methods encourage active participation and can help cement the knowledge presented. 

For instance, a game might simulate the process of identifying phishing attempts, while scenario-based training could involve role-playing exercises where employees respond to various security threats. Using narratives from real-world breaches can also dramatically underline the importance of vigilant security practices and the severe consequences of negligence.

Frequent and Varied Training Sessions

Cybersecurity training must be an ongoing effort to remain effective. The digital threat landscape is continually evolving, and so should your training program. Regular training sessions should be scheduled to reinforce previous lessons and introduce new topics as threats arise. To prevent these sessions from becoming monotonous, vary the training methods and content. 

For example, one session might focus on the technical aspects of cybersecurity, such as understanding malware and its mitigation, while another session could deal with behavioral aspects, like identifying suspicious email characteristics. Changing the format—from workshops to webinars or interactive e-learning modules—can also help maintain engagement.

Testing and Feedback

An integral part of any training program is evaluation. By incorporating tests, such as quizzes or simulated phishing emails, you can measure how well participants are absorbing the material. These tests also help identify areas where additional instruction may be necessary, allowing you to tailor future training sessions to address these gaps. Equally important is gathering feedback from participants. 

This feedback can provide critical insights into how engaging and helpful the training sessions are and what improvements can be made. Encourage honest feedback by making it easy and anonymous to provide. Use surveys or feedback forms at the end of each session to collect participants’ thoughts and suggestions.

Creating a Security Culture

The overarching goal of security awareness training is to instill a robust culture of security throughout the organization. This cultural shift requires buy-in from all levels of the organization, from the executive suite to entry-level employees. Each individual must understand the critical role they play in maintaining security and be committed to upholding best practices. 

Leadership must lead by example, demonstrating a commitment to cybersecurity in their actions and policies. Regular communication from the top down about the importance of security, recognition of employees who exemplify good security practices, and ongoing support for security initiatives are essential for embedding security into the organizational culture.

Tools and Resources for Cyber Security Training

Several tools and resources can enhance your security training efforts. Software that simulates phishing attacks provides practical experience in spotting scams. Online platforms offer a range of training modules that can be customized to meet your needs. Additionally, there are numerous free resources available that provide valuable content for starting or supplementing your training program.

Conclusion

Implementing robust security awareness training is not just beneficial; it is necessary for the protection of both personal and organizational digital assets. Starting with a comprehensive and engaging training program, regularly updated and supported by a strong security culture, can significantly reduce the risk of cyber threats. By taking proactive steps today, you can safeguard your digital tomorrow. Start small if you must, but start—your security depends on it.

 

How VPNs Can Protect Your iPhone from Cyber Threats

In the digital age, where cyber threats are increasingly sophisticated, protecting your iPhone’s data is more critical than ever. Virtual Private Networks (VPNs) offer a robust line of defense, ensuring your digital privacy and security in various ways. Let’s explore how a quality VPN, such as a robust VPN for iPhone, can shield your device from numerous cyber threats.

Encryption of Data Transmission

The fundamental security feature of any VPN is its ability to encrypt data transmissions. When using a VPN on your iPhone, your data is secured in an encrypted tunnel, rendering it unreadable to potential interceptors. This encryption is particularly vital when transmitting sensitive information, such as passwords or financial data. VPNs employ advanced encryption protocols like OpenVPN or IKEv2/IPsec, balancing maximum security with optimal speed. This encryption ensures that your personal information remains confidential, safeguarding it against cyber criminals who may intercept network traffic.

Securing Public Wi-Fi Connections

Public Wi-Fi networks are convenient but notoriously insecure, making them prime targets for cybercriminals. A VPN secures your iPhone’s connection on these networks by routing your internet traffic through encrypted servers. This hides your online activities from potential snoops on the same network. By using a VPN on public Wi-Fi, you substantially lower the risk of cyber attacks, keeping your personal information safe from the vulnerabilities commonly found in these networks.

Anonymizing Online Activities

Anonymity is a crucial aspect of cybersecurity. A VPN masks your iPhone’s IP address, making your online activities anonymous and protecting you against targeted cyber-attacks and surveillance. This anonymity makes it challenging for hackers to track your online movements or determine your physical location, providing a critical barrier against identity theft and digital espionage.

Blocking Malicious Sites and Adware

Beyond encryption and anonymity, many VPNs offer integrated features to block access to malicious websites and ads. This is a proactive security measure, vital in an era where cyber threats are constantly evolving. By filtering out harmful content, a VPN can prevent your iPhone from being compromised by malware, protecting your personal data from unauthorized access or theft.

Regular Updates and Security Patches

The dynamic nature of cyber threats necessitates regular software updates. A VPN that frequently updates its software ensures protection against the latest vulnerabilities and threats. These updates often include security patches for newly discovered exploits, keeping your iPhone secure against emerging cyber threats. A commitment to regular updates is essential for maintaining high security on your iPhone, protecting it from the plethora of evolving cyber risks.

In conclusion, employing a VPN on your iPhone is a prudent step towards enhancing your digital security and privacy. It provides a multifaceted defense mechanism against various cyber threats, from encrypting data to blocking malicious sites. Remember, not all VPNs are created equal. Choose a VPN that offers comprehensive features and regular updates to ensure the best protection for your iPhone in the ever-changing landscape of cybersecurity.

1 in 5 CIOs Believe Cyber Security Ops Are Not An Immediate Priority

In April 2023, Acora conducted a survey that revealed insights into the changing responsibilities of Chief Information Officers (CIOs), focusing on mid-market companies in the UK. The research included 126 decision-makers from UK-based financial services companies and aimed to identify the difficulties and modifications that resulted from the transition to a hybrid work model after the pandemic.

The evolving role of CIOs

The survey findings revealed that 65% of IT leaders believe that hybrid working has elevated their role within their respective organisations, and 61% reported additional responsibilities such as direct involvement in due diligence activities. The study underscores the vital position of cybersecurity within organisations, with 67% of respondents listing it as their top focus area. This signifies the continued significance of cybersecurity, an issue that previous reports have highlighted as the “big, scary cybersecurity monster”.

Investment in cybersecurity

IT budgets are another focal point in the survey. While 55% of IT leaders predict an increase in their budgets in the coming year, this marks a significant drop from last year’s prediction of 77%. The use of Managed Service Providers (MSPs) is also on the rise, with 92% of respondents planning to work with them this year. However, there are concerns about MSPs’ ability to support their company’s growth strategy, with 48% expressing apprehension.

Integrated cyber security and IT operations

The role of Managed Service Providers (MSPs) is also projected to increase, with 92% planning to collaborate with MSPs. However, there is some concern about these providers’ ability to support the company’s growth strategy, with 40% expressing concern and 8% certain they will need to look for other providers.

Diverse patterns are emerging in the management of cybersecurity operations across different organisations.

  • 50% of respondents noted that Cybersecurity Operations and IT operations are managed together as a single in-house department.

  • 32% reported that Cybersecurity operations function as a separate, standalone department within their organisation.

  • 10% have chosen to outsource Cybersecurity and IT operations, which a third-party provider collectively manages.

  • 8% have outsourced Cybersecurity operations to a third-party provider that operates separately.

Interestingly, one in five (20%) respondents indicated that although cybersecurity operations are not an immediate priority, they plan to look into it in the future.

These outsourcing organisations face two significant challenges. Firstly, they need to identify a trusted partner with the right capabilities and reputation that aligns with their current business needs and future growth plans. Secondly, they must navigate the complexities of managing multiple third-party providers. Finding a single partner that can address IT and cybersecurity operations could allow these companies to reap the same benefits as those that control these functions as a single in-house team.

Focus areas for cyber security

Cybersecurity threats are becoming increasingly sophisticated, with attackers using targeted methods to inflict reputational and operational damage. While technology tools are helpful, the complexity of threats necessitates skilled professionals. However, maintaining an in-house team with the required specialities is often neither practical nor affordable, leading organisations to work with external experts.

The unfolding AI narrative adds to the current climate of uncertainty, requiring IT leaders to step up and guide organisations about its implications and opportunities.

“AI isn’t ‘difficult’ technically,” Chief Information Officer Lee Ganly explains. “The challenges are around intellectual property, security, and policy issues. It’s hard to predict where AI will sit in the wider IT landscape, even this time next year. All we can say for certain is it’s going to be a fascinating journey.”

Acora is an award-winning managed IT and Cyber Security solutions company, providing a range of IT support, cyber security, applications, data and cloud solutions. View the full version of Acora’s 2023 CIO report here.

Electric vehicle charging points vulnerable to cyber attack

Belfast based cyber security specialist ANGOKA says developers of the UK’s fast-growing network of electric vehicle charging points could be sleep-walking into a high-risk vulnerability to hacking and cyber-attacks.  

Significant and rapid growth in the number of electric vehicle charging points is expected in the next three years. There are estimated to be more than 100,000 petrol and diesel pumps across the UK while the number of EV charging points( home and Public) stands at over 350,000 and counting.  While the growth in public charging points will grow exponentially, the risk of hacking, disabling and even weaponizing these has become an increasingly recognized problem. 

Richard Barrington, ANGOKA’s head of land mobility says the race to decarbonize and the shift to electrification goes hand in hand with digitization.  

“We need to electrify our economy but we have not fully understood the need for cyber security in this transition,” says Mr Barrington.  

“While data protection through encryption is in place to prevent the theft of financial information through credit cards and electronic payment forms, the cyber security of the actual charging points should be at the top of the agenda,” he says. 

Because EV charging points are all networked, the risk goes beyond theft of financial information or abstracting electricity. ANGOKA says the potential to engineer an attack back onto the national grid or spoof charging indicators allowing batteries to be over or undercharged means the industry must adopt the Zero Trust principles of Never Trust, Always Verify! 

“The threat landscape becomes even more extensive when you consider the bi-directional data exchange between vehicle and charging point,” says Mr Barrington, “this data exchange can be unprotected and vulnerable meaning hijacking, the introduction of malware and denial of service attacks become probable. 

ANGOKA says the responsibility of providing the cyber security to protect these from attack has fallen between the players in the supply chain, Manufacturers, Installers, operators and procurers e.g. local authorities. 

New regulations coming into force next year creates a more open market in that anyone should be able to use any charging point  irrespective of the operator.  Unfortunately greater levels of interconnectivity will lead to a widening of the threat landscape and risk potentially at national scale.  Mr Barrington. “We believe there is an approach that can address these concerns and the  EV charging sector and the motor industry must step up and take action.” 

Representatives from the automotive sectors are due to meet ANGOKA representatives in Belfast in the coming weeks in anticipation of new EV charging point regulations to be introduced next summer.  

Advantio acquired by Integrity360 to expand European footprint and provide complementary cyber services capability

As part of its Pan European expansion plan, Integrity360 has acquired leading European PCI QSA (Payment Card Industry Qualified Security Assessor) and cyber security services company Advantio. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to expand further into continental Europe and provides an additional cyber services practice focused on PCI compliance – complementing Integrity360’s existing service practices which include cyber risk and assurance, cyber security testing, incident response, infrastructure, end-point and SIEM professional services and a highly comprehensive range of cyber security managed services. Advantio will continue to operate from its existing wide-ranging European facilities but with the benefit of the full resources and capability of the existing Integrity360 business. In addition, Integrity360 has formed a strategic partnership with the Advantio founders to expand the footprint of ZeroRisk, an innovative SaaS platform providing compliance and cyber risk management profiling services for the payment industry.

Advantio was founded in 2009, employs approximately 115 employees and is headquartered in Dublin, Ireland and operates from facilities in Italy, Spain, UK, Lithuania, and Ukraine serving more than 250 customers across Europe, the USA and Asia. For the last three years, Advantio has achieved growth rates of circa 25% pa, and during the next 12 months expects revenues of circa €10m. The combination of Advantio with Integrity360 brings group revenues to approximately €115m in 2023, from circa €85m in 2022, and expands group resources to approximately 450 employees. Advantio’s cyber services capabilities include PCI compliance, cyber security testing, cyber risk and assurance and MDR services (Managed Detection and Response) and are both expansive and complementary to those of Integrity360.

Advantio’s existing SOC (Security Operations Centre) operation in Naples will be combined with Integrity360’s other three SOCs in Dublin, Sofia, and Stockholm – now operating with over 100 dedicated engineers, consultants and cyber experts in delivering a wide-ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360’s innovative range of services were recently recognised for a third time in a Gartner market guide, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services.

Advantio has a leading position in PCI compliance and operates as one of the leading Qualified Security Assessor organisations in Europe and across the world. Its position is reflected by its standing as being the No 1 most chosen QSA organisation by Visa service provider organisations across Europe, and No 4 most chosen by Mastercard service provider organisations. Advantio has also been a proud member of the PCI GEAR (Global Executive Assessor Roundtable) since 2018, helping to refine and define PCI standards for the benefit of the industry. Advantio’s PCI expertise adds to Integrity360’s existing regulatory and cyber framework services capability including ISO27001, Cyber Essentials, cyber security strategy, and third-party risk management.

Ian Brown, Executive Chairman at Integrity360, commented: “We are delighted to be welcoming the Advantio team to Integrity360. The enhanced group will now significantly expand our existing activities and cyber services throughout continental Europe, and further develop Advantio’s considerable expertise in PCI compliance. The combination of the two businesses provides a powerhouse of technical cyber and security payments expertise for the group’s customer base, including preparing for the impending arrival of the new PCI DSS 4.0 standard which requires comprehensive threat detection and incident response services. The two companies are highly complementary, with common strengths in cyber assurance, cyber security testing and managed detection and response and share the same customer service ethos. We look forward to delivering our expanded and extensive range of services for the benefit of our combined customers over the coming weeks and months.”

Marco Borza, Founder and Chief Executive Officer of Advantio, commented: “I am delighted that Advantio is joining Integrity360 and continuing the growth journey that we started some 14 years ago. Thanks to the support of our customers and employees Advantio has become a leading QSA and provider of cyber services across Europe and other overseas markets. Advantio is excited to continue that journey but also with Integrity360’s support, allowing us to expand our services and market coverage.  Our skills combined with those of Integrity360 will provide an extension of our portfolio of professional, support and managed services. This is great news for employees, customers, and partners.  I am also delighted that we are forming a strategic partnership with the wider Integrity360 group to expand ZeroRisk’s merchant management platform, currently enabling merchants and merchant service providers to measure risk and manage compliance. I look forward to working closely with Ian and the wider Integrity360 team over the coming years”.

Emerging Cyber Threats and the Role of Technology Media: A Spotlight on TechBuzzIreland and Guardio

The digital cosmos is presently in the throes of a substantial surge in cyber terrors. Proliferating at an exponential rate, this phenomenon is an offshoot of our existence in the era of bits and bytes. Miscreants of the virtual world, armed with progressively refined assault arsenals, continue to create menacing ripples. The onus, therefore, falls upon our public and private enterprises to outpace this ominous curve, shielding their data troves and virtual valuables.

Guardio, a luminary in the cybersecurity sphere, paints a picture of these threats morphing ceaselessly. This fluid landscape dictates a dynamic approach, punctuated by frequent fine-tuning of our protective and counteractive game plans.

The Role of Technology Media Outlets
In this intricate cyber landscape, technology-focused media outlets like TechBuzzIreland have a crucial role to play. These platforms can serve as a conduit between cybersecurity firms and the public, demystifying complex concepts and
sharing actionable insights in a language that non-technical individuals can understand.

Bridging the Information Gap
The average person may not fully grasp the complexities of cybersecurity. Still, they undoubtedly need to understand the potential risks and preventive measures that can shield them from becoming victims. Here, tech media outlets bridge the gap by transforming complex cybersecurity information into comprehensible news and articles.

Providing Timely Updates
TechBuzzIreland, and similar outlets, provide real-time updates on the latest cybersecurity threats and advancements in cyber protection. Given the rapid pace at which cyber threats evolve, these platforms; real-time updates are essential in
equipping the public and businesses with the information needed to stay safe. Guardios Insights on Emerging Threats
Guardio has been at the forefront of identifying and combating emerging cyber threats. Its insights have been instrumental in the fight against cybercrime, and its partnership with technology media outlets amplifies its reach and impact.

The Threat Landscape
Guardio has highlighted the rise of various cyber threats. These include ransomware attacks, which have seen a significant increase, especially against businesses. Ah, phishing attacks – an ominous specter that looms large. Their footprints have
become all too familiar in our digital alleys. Crafty rogues are taking a keen interest in the Achilles’ heel of security apparatuses – we, the humans!

Meanwhile, Guardio pulls the curtain back on a sinister puppet show – the Advanced Persistent Threats or APTs, if you will. Picture malevolent hackers as crafty spiders weaving webs within a network. Slipping in, they opt to dwell, clandestine, in the
nooks and crannies for what seems like an eternity. This malicious occupancy allows them to pilfer and plunder delicate data morsels, all while remaining cloaked in the shadows. Unnerving, to say the least.

Steps to Mitigate Threats

Guardio suggests multiple steps to mitigate these threats. For ransomware, for instance, they advise frequent backups of essential data and keeping systems and software up-to-date to avoid known vulnerabilities. Guardio also emphasizes the
importance of strong, unique passwords and the use of two-factor authentication.

For phishing attacks, education is key. Picture this: Internet denizens must morph into virtual sleuths, on the lookout for tell-tale signs of phishing exploits. Skepticism should be your newfound companion when it comes to unsolicited links winking at
you or whispers asking for personal tidbits. Guardio, sporting its armour of high-tech tools, promises to be your digital watchdog, barking alerts when it sniffs out anything remotely shady in your digital neighborhood.

The Power of Collaboration: Technology Media and Cybersecurity
When cybersecurity companies like Guardio and technology-focused media outlets like TechBuzzIreland collaborate, they create a powerful force against cyber threats. Together, they can communicate complex cybersecurity information effectively,
ensuring both businesses and individuals are better equipped to deal with emerging cyber threats.

Facilitating Wider Dissemination of Cybersecurity Knowledge
When Guardios insights are communicated through media outlets, the information reaches a broader audience. Businesses, institutions, and the general public get timely access to valuable cybersecurity knowledge, which can significantly reduce their risk of falling victim to cyber threats.

Cultivating a Cybersecurity Culture
By educating the public and businesses on cybersecurity best practices, these collaborations contribute to cultivating a culture of cybersecurity. When cybersecurity becomes a part of everyday conversations, individuals and businesses are more likely to adopt better security habits, thus reducing their vulnerability to threats.

Conclusion: Embracing a Proactive Stance
In conclusion, the rise of cyber threats demands a proactive stance. It’s not enough to react to threats as they occur; we must anticipate them and take preventive measures. Technology media outlets like TechBuzzIreland, in collaboration with
cybersecurity firms like Guardio, can play a vital role in this regard. By providing up- to-date, accessible, and actionable information, they can empower individuals and businesses to safeguard their digital assets effectively. In a world increasingly driven by digital interactions, this could be the most crucial battle we face.

People as important as technology in strengthening cyber resilience – By Catherine Doyle, Managing Director, Dell Technologies Ireland

In today’s data-driven world, cyber security is more important than ever. Despite the uncertainty of recent times, businesses and organisations in Ireland are still transforming at speed.

Technology remains at the very centre of Government efforts to foster innovation and economic growth. The latest national digital strategy sets out a range of ambitious targets to ensure that three in four Irish businesses adopt Artificial Intelligence, Big Data and Cloud by 2030. 90% of services are also due to be consumed online by the end of the decade.

While these targets are welcome and, moreover, necessary to make sure Ireland harnesses the full potential of the very latest technologies, it’s also the case that an increase in digitalisation brings with it a corresponding increase in the threat of cyber-attacks.

Evolving cyber threats

Over the past year, we have seen several high-profile cyber incidents here in Ireland that reinforce the need for small and large businesses across the public and private sector in Ireland to enhance their cyber resilience. Indeed, in 2022 alone, the total cost of cybercrime is estimated to have surpassed €10bn.

As cyber-crime becomes more prevalent so do the sorts of attacks levelled at businesses become more insidious. The Garda National Cyber Crime Bureau and National Cyber Security Centre (NCSC) warned about an increase in ransomware attacks against small and medium sized businesses (SMEs) over the past few months. In recent weeks, the National Cybersecurity Coordination and Development Centre has been created to help strengthen SME cyber resilience. 

The problem is that the ability to protect an organisation’s data has become increasingly difficult with some SMEs overwhelmed. A shift to hybrid working has given malicious actors new opportunities to target vulnerable remote workers while phishing attacks and email thread hijacking have been on the rise.

Business leaders are beginning to react, with nine in ten business leaders now recognising the vital importance of building the cyber resiliency of their firm. From Zero Trust frameworks for the verification, assurance and protection of data to robust response and data recovery plans, Irish leaders are turning to new technologies and new technology models to strengthen their cyber security. 

Importance of culture 

However, cybersecurity is just as much, if not more, about people than technology.

In tandem with technology solutions, there needs to be a cultural shift within businesses that recognises the importance of cyber security. This comes from the top of the organisation and filters through down to all levels and departments.

Business leaders are actually the first line of defence. By setting the tone and the culture for cyber resilience within an organisation, leaders play a vital role in putting cyber security at the very heart of business strategy and workforce development.

A key component of this is influencing employee behaviour around cyber resilience in the workplace – empowering their people with the latest training and skills to become role models and champions of the best cyber security practices.

While the latest intelligent tools and data protection services will always play a critical role, they are just one key part of an overall strategy that recognises how everyone within the business needs to work together to ward off cyber threats. 

Whole of organisation approach

This particularly applies to those teams who are developing new products or services. By integrating cyber security into both their products and practices, these teams can help to close the loop on cyber security for their own business and that of their customers.

In this way, leaders can better embrace a comprehensive approach to cyber risk mitigation that goes beyond mere threat detection. Rather, they can ensure that cyber security plays an integral role in an organisation’s overall business strategy from the very beginning and is considered in any future digital transformation initiatives. 

At Dell Technologies, we’re seeing more organisations across both the private and public sector treat cyber security as an integral component of their overall digital transformation strategy. When setting out to build a consistent digital learning experience for its 34,000 students and staff in a hybrid world, Ulster University tapped into Dell’s team of cyber experts to enhance its cyber resilience.

Protecting Ireland’s most critical data

With AI, 5G and Edge Computing developing at pace, Ireland has a unique opportunity to become a world leader in a range of emerging technologies. However, if we are to reach our 2030 digital targets, we need to continually ward off the latest cyber threats and protect Ireland’s reputation as a digital hub both in Europe and beyond.

At Dell Technologies, we are continually working to help Ireland remain one step ahead of cyber threats. Through a €2m investment in our new Customer Solutions Centre in Cork, we’re looking to provide the essential infrastructure for organisations to protect their most important information assets and help strengthen the city’s location as a cyber security hub.

But, as cyber threats become more sophisticated and costly, business leaders need to become the front line of defence on this journey.

That means placing a strong focus on building a culture where cybersecurity is everyone’s responsibility and where their people have the skills to enhance cyber resilience within their organisation. By fostering that culture, leaders of large, medium and small businesses can not only protect themselves against the increasing threat of cyber-attacks but can reduce business disruption and recover more quickly “when” and not “if” an attack occurs in the weeks and months ahead.

ANGOKA wins big at Infosecurity Europe 2023

Belfast-based cyber security specialist ANGOKA has been awarded the title of ‘UK’s Most Innovative Cyber SME’ at this year’s Infosecurity Europe.

ANGOKA’s solutions for smart cities and smart mobility, which strengthen the cybersecurity and safety of connected devices such as connected and autonomous vehicles, have been recognised by both the Department for Science, Innovation and Technology (DSIT) and Infosecurity Europe as meeting technology goals, seeing them win the award as the UK’s Most Innovative Cyber SME 2023.

Now in its eighth year, the prestigious contest open to micro, small and medium cybersecurity businesses registered in the UK saw 14 of the UK’s most creative and original information security businesses shortlisted and competing for the title.

ANGOKA’s unique and patented solution represents a paradigm shift by securing the device rather than the network. They provide an integrated identity and key management technology to embed trust in connected devices even over untrusted networks in areas including Critical National Infrastructure, Smart Cities, Smart Mobility, and Industry 4.0

In accepting the award, ANGOKA’s business development manager, Paul Ellis said: “The UK has a brilliant and dynamic cyber sector and to be recognised by your industry peers is a great honour and truly humbling. We’ve approached the important issue of securing IoT and machine to machine communication with a fresh perspective and a unique approach that’s increased traction in the market. We’ve got something different and the judges recognised our innovation and the future of ANGOKA. This recognition will help us continue on our upward trajectory.”

Andrew Elliot, deputy director, DSIT, added: “Cyber SMEs are the backbone of the UK sector, making up more than 90% of the companies in the country. They help drive innovation by bringing new products and services to the market, and that is why we are proud to sponsor this competition. Congratulations to this year’s winner ANGOKA, and all the finalists for making the final decision so tough.”

Nicole Mills, exhibition director at Infosecurity Group, commented: “This competition is a highlight of the event and an opportunity to spotlight innovation and provide a launch pad for up and coming cybersecurity start-ups. We’ve seen past winners really thrive and go on to achieve great things, growing exponentially and receiving funding to continue their growth. ANGOKA are a prime example of a company keeping pace with an evolving industry and spotting opportunities to innovate and meet industry demands.”

Infosecurity Europe is the biggest gathering of the information security industry in Europe, taking place between 20–22 June 2023 in ExCel London.