Cybersecurity: mitigating risks through
BSIA’s registration scheme

The BSIA have long been concerned with the ever-increasing use of internet connected devices and systems in electronic security and how the growing links to home and business networks can leave individuals and companies vulnerable to cyberattacks.

WIn response to this, the BSIA formed an interest group known as the Cyber Security Product Assurance Group (CySPAG). The group is made up of member companies and other stakeholders from a range of industry sub-sectors and subject matter experts who are focused on reducing the risk of product related cybercrime.
The object of the group is to provide the professional electronic security industry with the tools and materials that enable security companies to manage the cybersecurity impact of their products and systems.

This year saw the launch of its first major step in this direction with the security equipment manufacturer’s cybersecurity registration scheme. The new self-declaration registration scheme is based on the requirements of BSIA Form 343 Manufacturers of safety and security systems cybersecurity code of practice, and its aim is to provide a level of confidence to the supply chain - including end users - that product procured for use in safety and security systems have been produced by CySPAG registered manufacturers who have processes in place to manufacture, supply products using cyber risk mitigation techniques and provide ongoing support throughout the product lifecycle...

Read More >>>

Ransomware Attacks and Preparedness
Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security

Ransomware is one of the biggest security challenges facing businesses today. ENISA (the European Union Agency for Cybersecurity) recently defined today’s threat landscape as the "golden era of ransomware."

To assess the extent of the challenges organisations face in dealing with the increase in ransomware threats, Menlo Security surveyed 500+ IT security decision makers in the UK and US.

What’s clear is that the shift to remote and hybrid working has expanded the attack surface for many organisations, opening up new vulnerabilities, attack vectors and entry points for attackers. One third of organisations now experience ransomware attacks at least once a week – with almost one in 10 experiencing them daily – according to our research.

Attackers are continuing to develop more advanced techniques to increase the likelihood of successfully demanding a ransom payment. There has been a surge in a class of cyberthreats known as Highly Evasive Adaptive Threats (HEAT), which are designed to bypass detection from traditional security tools such as Secure Web Gateways, sandbox analysis and phishing detection solutions...

Read More >>>

IoT security – the journey to maturity
Phil Beecher, CEO and President, Wi-SUN Alliance

Wi-SUN Alliance published its latest ‘state of the nation’ Internet of Things (IoT) research report – The Journey to IoT Maturity – earlier this year. There are many positives to take away from it. The study, which was a revisit of the one we conducted five years ago when the IoT market was much less mature, indicates that many of the challenges and barriers to adoption have been overcome.

What’s really encouraging is that there is an overwhelming sense that IoT is now a bigger priority than ever before, with over 90% of IT decision makers surveyed admitting they must invest in IoT technologies over the next 12-18 months. This is largely to gain competitive advantage in their market, but also to reduce costs and create business efficiencies.

WhThis isn’t the only difference. Five years ago, security was one of the main concerns among survey respondents (UK and US IoT adopters across a range of industry sectors) with the majority (58%) ranking security as one of their top three challenges. In the latest report, around a quarter (24%) regard security as one of the top barriers when rolling out IoT.

The percentage of people referencing security and safety as a technical challenge also fell, from 65% five years ago to 42% today – a significant drop of over 20%...

Read More >>>

Apricorn Launches Higher Capacity Aegis Secure Key 3™, The Market’s First 2TB
Hardware-Encrypted Flash Key

Apricorn, the leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, today announced the release of the USB 3.2 Gen 1 Aegis Secure Key 3 2TB encrypted flash key. Designed for organisations that need large amounts of encrypted storage with a minimal footprint, the new 2TB Aegis Secure Key 3 is the industry’s first hardware-encrypted flash key of this size, marking a time-honoured tradition of innovation from Apricorn. Currently, the Aegis Secure Key 3 has eight capacity options ranging from 16GB to 2TB, pricing from $129.00 – $999.00 U.S. 

Read More >>>

Military badge of honour for
Computer Network Defence

A cyber security consultancy in the South has received national recognition for its steadfast support of the military community. Computer Network Defence is one of only 19 regional winners to receive the Gold Award in the Armed Forces Employer Recognition Scheme 2022...

Read More >>>

The Rise in Identity-Driven Cyber Security Breaches

Identity management involves monitoring and authorising access of the person (or machine) behind the screen and what they can access. The main priority in identity-based security is keeping the right people in and the wrong people out. Whilst this strategy has always played a part in traditional security measures, such as password-protected account logins and face and fingerprint identification, a need for more robust identity-based security measures has emerged since the onset of COVID-19...

Read More >>>

PROSecurenewsonline.co.uk published by
GMS Business Communications
Sandalwood, Fallapit Barns, East Allington, Totnes, South Hams, Devon, TQ9 7QS

Tel +44 (0)1548 521862

Disclaimer & Copyright
All rights Reserved
No part may be reproduced without the prior written permission of the Publisher.
Whilst every care is taken, prices and details are subject to change and the publisher can take no responsibility for omissions or errors.
No responsibility is taken for unsolicited submissions or the return of submitted items.
The Publisher gives no guarantee of actual publication date.