Growing number of corporate cyber attacks in Ireland

Research from the Irish Computer Society, published in January, found that more than half of Irish companies suffered a security incident last year. Data breaches, hacking incidents, employee negligence and external attacks all increased – almost one in five Irish companies claimed to have fallen victim to malicious external attack.

Examine the findings further, and the reason for these statistics quickly becomes obvious:

• One in three Irish companies have no corporate data breach policy.
• Almost half of Irish firms’ staff are poorly trained for data breaches.
• Most Irish companies have no guidelines on transferring data outside the country.

Alan Calder, founder and executive chairman of IT Governance, says: “One way of countering this trend is to implement best-practice information security controls. ISO 27001 sets out the requirements of an enterprise-wide information security management system (ISMS), a risk-based approach to information security that encompasses people, processes, and technology.

“Organisations of all sizes, sectors and locations can use ISO 27001 to implement and maintain security controls to mitigate the specific threats they face, and accredited certification to the Standard enables organisations to demonstrate that they are following a best-practice approach to information security.”

Thanks to IT Governance’s fixed-price ISO 27001 Packaged Solutions, Irish organisations can now take advantage of expert ISO 27001 consultancy to implement the Standard for as little as €5,095.

With their unique combination of standards, books, toolkits, software, training and online consultancy, IT Governance’s packages provide Irish organisations with all they need to implement the Standard and ensure their cyber security. 
Ein News:  http://bit.ly/1LgeWk1

« Iran Ministry Of Defense Hacked By Saudi Hacker
Russia & China Grow Closer With New Cyber Agreement »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Etalon Cyber

Etalon Cyber

Etalon Cyber provides a range of advanced features to ensure the highest level of security for your website.