Join other Information Security Professionals and Subscribe

to receive monthly insights on securely enabling business transformation

Bridgeway Insights

Welcome to Bridgeway's Blog - bringing you news, views and opinions on issues that matter to you.

The purpose of this blog is to help you in your job and offer a better understanding of security. If you have any thoughts on the content or you'd like us to cover something then please don't hesitate to tell us.

Posted by Lisa Higgins 23 April 2019

As most security breaches come as a result of social engineering, organisations are now looking to educate their staff on the the increasing threat of cyber attacks. These breaches arrive in the form of phishing, where bad actors send emails with deceptive content to attract and engage users, leading to unknowing downloads of malware or visibility into bank accounts or personal details.

Continue reading...
Posted by Lisa Higgins 8 April 2019

The world of emerging tech is complex and often daunting. We can quickly get used to shutting ourselves away, confined within our own working environment and left to deal with all the various struggles and challenges that arise by ourselves - or if you’re lucky enough, with a supportive team. That’s why at Bridgeway we host our Cloud & Mobile Security Forum events, because we hear how valuable it is for IT professionals to come together outside the office with peers and share their challenges, issues and ways to overcome them. 

Continue reading...
Posted by Lisa Higgins 5 April 2019

The results from this week’s university hacking test are shocking - but things are only going to get worse. Cybercrime is not going away, in fact it is growing in scale despite organisations efforts to prevent it. So what can we do about it?

Continue reading...
Posted by Lisa Higgins 27 March 2019

We caught up with top digital transformation influencer and Advice Cloud Strategic Adviser Jos Creese. Jos has over 30 years IT leadership experience, including CIO and CDO roles, and a variety of Non-Exec Director positions (including audit and risk and chair). He is a past president of both the Society of IT Management (SOCITM) and the BCS, the Chartered Institute for IT, and has been cited as 'the most influential UK CIO' in the Silicon 50 survey.

Continue reading...
Tags
advisory
Posted by Lisa Higgins 27 March 2019

As high-grade security evolves to combat increasingly complex threats, why are basic attacks still enormously successful?

Continue reading...
Posted by Lisa Higgins 27 March 2019

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 7 March 2019

It has never been more vital for public sector organisations to safeguard personal data against unprecedented cyber threats. Risks from cyberattacks, with email being the main attack vector, have the potential to cripple services and affect day-to-day functioning of public administration at all levels.

Continue reading...
Posted by Lisa Higgins 26 February 2019

 

Continue reading...
Posted by Lisa Higgins 26 February 2019

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 12 February 2019

Consider all of your business data. Every email, instant message, document, image, video, article, spreadsheet... It’s a larger collection than you think and these days, in the highly regulated world of business, organisations need to account for and store their data for long periods of time.

Continue reading...
Posted by Lisa Higgins 7 February 2019

Despite all the new ways to share and receive, email remains the tool of choice for most business communication. From sending important documents to day to day collaboration and always on, anywhere access, email is central to productivity. So if your email system goes down, due to a planned outage or service migration, it can potentially cost millions in lost productivity, revenues and reputational damage. Not to mention leaving users frustrated.

Continue reading...
Posted by Lisa Higgins 24 January 2019

Many organisations think their current email security systems are up to the job of protecting them. Unfortunately traditional email security strategies can fall short of keeping organisations safe.

So what can you do? Here are Bridgeway's top tips:

Continue reading...
Posted by Lisa Higgins 16 January 2019

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 18 December 2018

What do BBC Online, Facebook, Netflix, Alexa, Office 365, Google Docs, HubSpot, Twitter, Dropbox, Linked In, Salesforce and WhatsApp have in common?

Continue reading...
Posted by Lisa Higgins 4 December 2018

Christmas festivities are almost upon us. With mulled wine ready to be consumed by the gallon across the UK and staff busy thinking about secret Santa and office parties, it’s a time for slowing down and celebrating another year that's passed. But as the workforce relaxes a little, what does that mean for information security? What happens if staff devices are left in a taxi or bus, or taken from someone’s bag? It’s a time for goodwill, but also a time for vulnerability when it comes to corporate data.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 5 November 2018

 

We meet the delegates who have completed our MobileIron training course here at Bridgeway HQ, in Cambridge.

Continue reading...
Tags
MobileIron
Posted by Lisa Higgins 24 October 2018

During this current decade we have gone from $37bn to over $96bn worth of annual information security spending, yet by whatever metric you want to use - the number of data breaches or the number of viruses for example - the picture is rather bleak. We’re spending more money but we’re getting more security breaches, so something isn’t working. The focus needs to shift; Mobile First or Cloud First is all well and good, but what about the user?

Continue reading...
Posted by Louisa Mackintosh 6 September 2018

Continue reading...
Posted by Louisa Mackintosh 28 August 2018

You may be aware that MobileIron introduced 'per user' licensing a couple of years ago. This is a surprisingly powerful way to achieve substantial cost savings for your mobility project, as each user licence can cover up to three assigned devices, yet each user licences costs roughly only 50% more than an equivalent single device licence cost. 

Continue reading...
Tags
IronWorks
Posted by Louisa Mackintosh 22 August 2018

The risks posed by inactive (dormant) users present on an organisation's servers are a potential goldmine for malicious attackers but also serve to highlight poor user management processes. Indeed, both the ISO 27001 control framework and the PCI DSS information security standard require organisations to monitor, act, and also report on these inactive users.

Continue reading...
Tags
IronWorks
Posted by Jason Holloway 16 August 2018

We believe mission-critical apps are at the very heart of modern digital transformation. Yet, reporting to senior management how these are being utilised across your estate - and whether they are being kept up to date or not - has never been easy.

Continue reading...
Tags
IronWorks
Posted by Louisa Mackintosh 16 August 2018

If you’re looking at implementing CASB (cloud access security brokers), you’ve probably begun to realise there are a myriad of options out there and they’re all designed slightly differently. So how do you know what you need?

Continue reading...
Tags
Bitglass
Posted by Louisa Mackintosh 26 July 2018

Materials costs rose by 4.8% between February 2016 and February 2017. This coupled with a chronic shortage of skilled labour, means construction firms across the UK are reporting increased pressure on margins, leading many firms to absorb these costs in an attempt to stay competitive. But how sustainable can that be?

Continue reading...
Posted by Louisa Mackintosh 23 July 2018

Often we can overlook the need for the right level of skills to successfully administer our EMM software on an ongoing basis. Being trained on your EMM or MDM solution is crucial when dealing with new technology, so that your leading-edge technology stays that way and doesn’t become a bleeding-edge project instead. It will give you the required knowledge needed to install, configure, deploy and manage the solution effectively, but it can also have wide reaching opportunity gains throughout the business.

Once you find an Unified Endpoint Management (UEM) solution that can manage your mobile estate, secure and manage your endpoints and cloud services, can you just sit back and relax? The answer is probably no.  

Continue reading...

 

 

Most Popular Articles