Growing number of corporate cyber attacks in Ireland

Research from the Irish Computer Society, published in January, found that more than half of Irish companies suffered a security incident last year. Data breaches, hacking incidents, employee negligence and external attacks all increased – almost one in five Irish companies claimed to have fallen victim to malicious external attack.

Examine the findings further, and the reason for these statistics quickly becomes obvious:

• One in three Irish companies have no corporate data breach policy.
• Almost half of Irish firms’ staff are poorly trained for data breaches.
• Most Irish companies have no guidelines on transferring data outside the country.

Alan Calder, founder and executive chairman of IT Governance, says: “One way of countering this trend is to implement best-practice information security controls. ISO 27001 sets out the requirements of an enterprise-wide information security management system (ISMS), a risk-based approach to information security that encompasses people, processes, and technology.

“Organisations of all sizes, sectors and locations can use ISO 27001 to implement and maintain security controls to mitigate the specific threats they face, and accredited certification to the Standard enables organisations to demonstrate that they are following a best-practice approach to information security.”

Thanks to IT Governance’s fixed-price ISO 27001 Packaged Solutions, Irish organisations can now take advantage of expert ISO 27001 consultancy to implement the Standard for as little as €5,095.

With their unique combination of standards, books, toolkits, software, training and online consultancy, IT Governance’s packages provide Irish organisations with all they need to implement the Standard and ensure their cyber security. 
Ein News:  http://bit.ly/1LgeWk1

« Iran Ministry Of Defense Hacked By Saudi Hacker
Russia & China Grow Closer With New Cyber Agreement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

BlackSwan Technologies

BlackSwan Technologies

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.