Growing number of corporate cyber attacks in Ireland

Research from the Irish Computer Society, published in January, found that more than half of Irish companies suffered a security incident last year. Data breaches, hacking incidents, employee negligence and external attacks all increased – almost one in five Irish companies claimed to have fallen victim to malicious external attack.

Examine the findings further, and the reason for these statistics quickly becomes obvious:

• One in three Irish companies have no corporate data breach policy.
• Almost half of Irish firms’ staff are poorly trained for data breaches.
• Most Irish companies have no guidelines on transferring data outside the country.

Alan Calder, founder and executive chairman of IT Governance, says: “One way of countering this trend is to implement best-practice information security controls. ISO 27001 sets out the requirements of an enterprise-wide information security management system (ISMS), a risk-based approach to information security that encompasses people, processes, and technology.

“Organisations of all sizes, sectors and locations can use ISO 27001 to implement and maintain security controls to mitigate the specific threats they face, and accredited certification to the Standard enables organisations to demonstrate that they are following a best-practice approach to information security.”

Thanks to IT Governance’s fixed-price ISO 27001 Packaged Solutions, Irish organisations can now take advantage of expert ISO 27001 consultancy to implement the Standard for as little as €5,095.

With their unique combination of standards, books, toolkits, software, training and online consultancy, IT Governance’s packages provide Irish organisations with all they need to implement the Standard and ensure their cyber security. 
Ein News:  http://bit.ly/1LgeWk1

« Iran Ministry Of Defense Hacked By Saudi Hacker
Russia & China Grow Closer With New Cyber Agreement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.