THE UK'S BIGGEST DATA BREACH FINES 2018

January 4, 2019

The ICO (Information Commissioner's Office) issued the most - and largest - fines ever in 2018, including: 11 fines totaling £1,290,000 to organisations for serious security failures. + 11 fines totaling. £138,000 to UK charities for unlawfully processing personal data in the 12 months to March 2018. From 25 May 2018 under GDPR it is a requirement for organisations to report serious data breaches to the ICO.

Spotlight

Mosaic451

Mosaic451 provides bespoke cyber operations, analysis, and critical infrastructure defense for high-risk, high-threat, complex and regulated (SOX, PCI, HIPAA, CIP, etc.) organizations in energy, finance, global distribution, government, healthcare, technology, and transportation. We protect complicated data and distribution systems, including water, hydro-electric, generation capacity, and transportation for tens of millions of Americans across the United States. We protect two of Southern California’s most prestigious healthcare systems; 31 hydro projects on the Columbia river basin alone; airports that serve over 90M passengers a year; and nuclear power plants in multiple states. Our operations methodology and leadership were forged in fire. Our team is drawn from the vanguard of US Military and Federal civilian cyber leadership, include the initial cadre of course developers for the USAF’s most prestigious cyber training program, the Cyber Warfare Operations Weapons Instructor

Other Infographics
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More
news image

Cybersecurity Best Practices Every Enterprise Should Follow in 2020

Infographic | February 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More

Spotlight

Mosaic451

Mosaic451 provides bespoke cyber operations, analysis, and critical infrastructure defense for high-risk, high-threat, complex and regulated (SOX, PCI, HIPAA, CIP, etc.) organizations in energy, finance, global distribution, government, healthcare, technology, and transportation. We protect complicated data and distribution systems, including water, hydro-electric, generation capacity, and transportation for tens of millions of Americans across the United States. We protect two of Southern California’s most prestigious healthcare systems; 31 hydro projects on the Columbia river basin alone; airports that serve over 90M passengers a year; and nuclear power plants in multiple states. Our operations methodology and leadership were forged in fire. Our team is drawn from the vanguard of US Military and Federal civilian cyber leadership, include the initial cadre of course developers for the USAF’s most prestigious cyber training program, the Cyber Warfare Operations Weapons Instructor

Events