Posts

Huawei warning: Expert reveals how spy could EASILY hack into UK’s 5G network

Daily Express | February 8, 2020

Boris Johnson’s decision to allow Huawei continued access to the UK’s 5G network could lead to a serious threat to the country, a leading expert has warned.The Chinese firm will be allowed to access 35 percent of the UK’s network, which includes its radio networks. Huawei will also be banned from supplying “sensitive” parts to the network, the UK Government revealed last month.

Mr. Johnson declaring there will be limits to Huawei’s access, speaking to Express.co.uk, Dr. Mike Lloyd, security expert and CTO at RedSeal, warned 35 percent is a “huge amount” for any potential spy.

14 Top Data Security Risks Every Business Should Address

Forbes | January 30, 2020

6. Managing The Increasingly Complex Digital Business Environment

Data breaches happen because it’s hard to do anything consistently at scale. Our top risk is failing to follow basic rules 100% of the time in a growing, changing, increasingly complex digital business environment. Attackers are like ants in a house—no matter what you do, they always find another way in. We need to manage complexity and apply basic security standards everywhere, all the time. – Mike Lloyd, RedSeal

The Latest CISO Headache – IoT

Sm@rt SMB | January 2020 (Page 30)

There’s a saying in the security world : “If it’s on the network, it belongs to the CISO.” Dr. Mike Lloyd, RedSeal CTO, discusses some steps the CISO can undertake where traditional techniques don’t seem to have an answer in securing IoT infrastructure.

What’s in Store? Cybersecurity in 2020

TahawulTech | January 2020 (Page 12)

What do you think will be the key drivers for security spending?

We are mid-way through the transition to the cloud, leaving most networks as a complex hybrid. Managing that complexity will be a major spending driver. Another key driver is compliance as the regulatory landscape continues to evolve, new regulations will drive spending. Lastly, cyber insurance will increase in importance in 2020, and this will steer spending towards defences that insurance providers want to see, in much the same way that car insurance drives car safety features. – Mike Lloyd, RedSeal CTO

12 Strategies To Get Your Staff To Stay On Top Of Software Updates

Forbes | January 16, 2020

A big irony in security is that the more critical a system is, the less likely it is to be patched well! To keep critical systems available, teams often deprioritize security. While security is abstract, an unavailable system is tangible and immediate. Security teams need to make the risk real so downtime seems necessary. Provide specific, personalized scenarios for why the action matters. – Mike LloydRedSeal

Can the UK government’s efforts solve the cyber skills gap?

Computer Weekly | December 30, 2019

The scarcity of skilled cyber security workers in Europe is getting worse, with just under two-thirds of employers saying they are now short of staff, according to the latest report from (ISC)2.

Mike Lloyd, chief technology officer at cyber risk modelling platform provider RedSeal, says that what is required is a mix of “base technical skills, which means learning how the modern digital world works, for example, how websites can be attacked”, and developing an “adversarial mindset, which takes years of experience in playing cat and mouse games”.

Tips and Guidance For Educational Entities To Ensure The Safety and Security of Their IT Data

Education IT Reporter | December 17, 2019

Schools are especially prone to ransomware attacks, due to the combination of weak security protocols, out of date computer equipment, and a lack of skilled staff. Digital infections can spread among school computers much the same as biological germs spread among students. Security is unfortunately quite a lot like a treadmill – it never stops. You can never arrive at a state of solid protection, because what was good enough yesterday won’t be good enough tomorrow. New vulnerabilities are continually being found. The need to invest in basic online hygiene is constant.

Securing the Supply Chain Against Cyber Disruption

Loss Prevention Magazine | December 11, 2019

Just like a physical chain, a supply chain is only as strong as its weakest link. Today’s issues are about networks of interdependence. We extract major economic benefits from modern supply chains, because each organization can focus on its core mission or specialty. This narrowing of focus is very effective, allowing each organization to be the best at whatever it does—making widgets, transporting them, or adding value by assembling parts made by other specialists. But this same narrowing of focus on just one aspect of a system means the system as a whole becomes fragile.

The smart tech threat to CEOs

TechRadar | November 7, 2019

The cybersecurity industry talks a lot about the importance of “board-level buy-in” for projects and a security-by-design culture led from the “top down”. What does that actually mean? It means CEOs and senior managers who “get” security: leaders who know that security done right can be a competitive differentiator and growth driver, not a block on innovation.

The reality is that most still do not.

Hackers access Bed Bath & Beyond customer data

Digital Commerce 360 | October 31, 2019

For a shopper who was impacted, she should ensure she doesn’t use the same password for her Bed Bath & Beyond account elsewhere. In fact, not reusing passwords is one way consumers can protect themselves from fraud, says Mike Lloyd, chief technology officer from cyber security firm RedSeal Inc.

“It’s important to realize that if you use the same password at your bank as you use for less important services like social media or video streaming, then a bad guy only has to break into whichever company has the weakest security, then steal your passwords and use them everywhere else you go,” Lloyd says.