Cyber Security Bill

Cyber Security Bill's success lies in how rules apply to each sector

Posted by SGCS Admin, 11-08-2017

We live in an age of rapid digitisation where mobile communication and cloud computing have dramatically increased cyber connectivity. The economic benefits of digitisation are shown by leading compa...

10 bad habits cybersecurity professionals must break

10 bad habits cybersecurity professionals must break

Posted by SGCS Admin, 11-08-2017

Demand for cybersecurity professionals continues to rise, with the projected talent gap in the field reaching 1.8 million jobs by 2022. Those that take on these roles play a key role in the enterprise...

9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

Posted by SGCS Admin, 10-08-2017

Companies and organizations are still struggling to deal with ransomware, a cyberattack in which user data is encrypted and held hostage, supposedly until a ransom is paid. This trend looks set to con...

China Enforces First Action Under Developing Cyber Security Law

China Enforces First Action Under Developing Cyber Security Law

Posted by SGCS Admin, 10-08-2017

China’s Cyber Security Law (the Law) went into effect on June 1. We have now seen the first enforcement action under the Law (news report in Chinese here). Chongqing’s Public Security Bure...

What hackers think of your cybersecurity efforts

What hackers think of your cybersecurity efforts

Posted by SGCS Admin, 10-08-2017

A survey of 250 self-identified hackers at the twentieth annual Black Hat conference in Las Vegas last month has revealed the security technologies they find toughest to beat. Of the hackers that res...

How to become a cybersecurity superhero

How to become a cybersecurity superhero

Posted by SGCS Admin, 08-08-2017

There are countless arch-villains out there setting their sights on healthcare organizations, with evil plans to wreak havoc via information technology and, in certain cases, even hold data and system...