A streamlined route to Cyber Essentials Certification – and so much more...
Expert advice and guidance throughout – and from people you can trust!
Providing clarity, for companies of every size , on good basic cyber security practices
An affordable yet robust cyber security offering for companies competing in today's business market place
Helping companies protect themselves today – for a safer business future tomorrow
A comprehensive and easy-to-use online portal developed by top cyber security industry specialists
A streamlined route to
Cyber Essentials Certification
– and so much more...
Expert advice and guidance
throughout – and from people
you can trust!
for companies of
every size , on good basic cyber
An affordable yet robust
cyber security offering for companies competing in today's business market place
Helping companies protect themselves today
– for a safer business future tomorrow
A comprehensive and easy-to-use online portal developed by top cyber security industry specialists
The Cyber Highway puts companies in better control of their cyber security: encouraging more reflective practices and driving continuous improvement in all aspects of cyber resilience.
The Cyber Highway presents companies with a fresh and practical approach to certification in line with the latest Government standards.
Our intuitive system helps businesses quickly identify areas of potential cyber-risk - and understand what is needed to mitigate current and future threats.
The skills gap we face in the cybersecurity profession has been well-documented for the past several years. In 2015, Frost and Sullivan estimated that 1.5 million positions will be open and unfilled by 2020 and that women make up only 10 percent of the cyber workforce. In other words, not only do we have a skills gap, we have a serious gender gap.Raising the Profile of Women in CybersecurityHot on the heels of International Womens Day, the Center for Cybersecurity Safety and Education just released the 2017 Global Information Security Workforce Study (GISWS): Women in Cybersecurity. Although participation in the 2017 GISWS increased by 40.9 percent, the report confirmed that representation of women in the cybersecurity workforce remains stagnant at 11 percent. Essentially, no progress has been made over the past two years, despite efforts by industry, government and academic agencies.With women representing roughly 50 percent of the worlds population and half of U.S. college graduates, according to the National Center for Education Statistics, why is it that only 11 percent of the cybersecurity workforce are women? Is it due to differences in educational background, the inability of women to advance in the profession, discrimination, a feeling of inadequacy or a simple lack of awareness related to career opportunities in the field?EducationThe study indicated that women enter the cybersecurity profession with higher education levels than men. Fifty-one percent of women in the profession have a masters degree or higher, compared to 45 percent of men. However, men hold a greater percentage of technical degrees, be it in computer and information sciences or in engineering and engineering technologies.Having said that, a closer look at the millennial population by the Center of Cyber Safety and Education revealed that a shift is underway. In fact, 52 percent of women under the age of 29 have an undergraduate degree in computer science. It will be interesting to watch the impact this shift has on the balance of women versus men in the cybersecurity workforce, particularly in the upper ranks.Womens AdvancementAccording to the study, men dominate senior roles in the cybersecurity profession. Globally, men are four times more likely to hold C-level and executive management positions. Women disproportionately occupy entry-level and nonmanagerial positions. If you are a woman who places high priority on career advancement, statistics like these are certainly not going to attract you to this profession, unless you are ready to put you game face on and be a change-maker.DiscriminationDoes discrimination contribute to the lack of women in cybersecurity? For the first time, the GISWS asked male and female participants in North America and Latin America questions about diversity and inclusion. Unfortunately, 51 percent of women in those regions indicated that they have experienced multiple forms of discrimination.Topping the list of challenges respondents faced were unconscious discrimination such as stereotyping and unexplained denial or delay of career advancement. Interestingly, Canada and Mexico reported the lowest percentage of discrimination.When asked about their impact on the security posture of the organization, 28 percent of women indicated that their opinions are not valued. Not surprisingly, women who did report feeling valued in their positions were more likely to indicate greater access to training, mentoring and sponsorship.AwarenessAs leader of academic programs and outreach for IBM Security, I spend a significant amount of time talking to students from middle to graduate school. I am always amazed by how little students know about the opportunities to be found in the world of cybersecurity.While roles like security analysts and researchers are in high demand, the cybersecurity field boasts a complete ecosystem of positions, from human resource professionals to lawyers, policymakers, designers, business strategists and product developers. No matter what your interests are, there is a good chance you can find a fit in cybersecurity.The next generations security workforce will require a broad set of skills to fill roles such as product designers, risk consultants and policymakers. We need a diverse set of backgrounds and talents to build the cybersecurity workforce of the future.A 2013 London Business School study revealed that teams with equal numbers of men and women are more likely to experiment, be creative and share knowledge. The security industry needs the best and brightest talent available, and that requires attracting more women to the field.Changing the BalanceThere is plenty of work ahead of us if we are to change the balance of men and women in cybersecurity. Here are just a few of the steps we can take together:Attract more women. Attracting more women to the profession has the potential to shrink the workforce gap, but only if women can be hired, trained and retained in significant numbers.Break down barriers. Train all employees on unconscious bias.Build awareness. In a 2015 ISACA study, 77 percent of young women stated that neither a high school teacher nor guidance counselor ever mentioned cybersecurity as a career option. Clearly, K-12 outreach is key to changing this statistic and growing the pipeline of women entering the cybersecurity workforce. Programs such as #IBMCyberDay4Girls, GenCyber and Girls Who Code can make all the difference. Reaching girls at a young age to get them informed and interested in cybersecurity careers is one key way we can help reduce the gender gap in the industry.Collaborate. Enterprises, academia and government need to work together. No single entity has the manpower to solve this problem alone. Collaboration is key security leaders need to take an active role in working with educators to drive awareness and training for the next generation of security professionals.Develop. Ongoing development, as well as access to mentors and sponsors, is critical to attracting, developing and retaining women in the cybersecurity workforce.Organizations must take significant actions to attract, develop and retain women, otherwise the global cybersecurity workforce gap will continue to grow. IBM is committed to reducing the cybersecurity skills gap and drawing more women to cybersecurity through:Partnerships with universities and initiatives to provide IBM security tools to train the next generation of security professionals;Programs to attract women and millennials to the workforce;IBM Securitys Women in Security Excelling (WISE) program, which encourages women to embrace security within the company and has more than 800 members worldwide; andContinued support of diversity initiatives.IBM is proud to sponsor the Women in Cyber Security Conference again in 2017. WiCyS 2017, which runs from March 30 to April 1 in Tucson, Arizona, will bring over 800 women together from around the globe to network and learn more about career opportunities in cybersecurity.
The app for teenagers and young adults was hacked and the data is circulating on the dark web, posing a risk for usersA rather popular social networking app for teens was hacked with attackers getting away with 2.2 million email addresses and some 287,000 cellphone numbers. The social networking app allows users to create and vote on simple quizzes with two options. In time, it has become extremely popular, especially among teenagers, something that makes this data breach that much more troublesome - many of the users affected by the incident are young people, including underage girls and boys. About 70% of users in a sample of 200 leaked accounts were under 18 years old.App Annie places Wishbone among the top 10 most popular social networking apps for iPhones in the United States, which means there are quite a lot of users playing around with it. Mostly, it is geared towards teenagers and young adults, mostly female, one of the founders said in the past.Data comes from unprotected databaseTroy Hunt, the security researchers behind breach notification website Have I Been Pwned? says that hackers found an unprotected database for the app and stole its contents, which are now circulating on the dark web.Motherboard reports that Hunt received what seemed to be a copy of a MongoDB database with Wishbone data on it. The collection of data on it included 2,326,452 full names, 2,247,314 email addresses, 287,502 cellphone numbers, as well as birthdates and user's gender.The data trove does not contain any identifying information for the affected users, mostly because Wishbone doesn't require it to create an account.The tech incubator behind the app, Science Inc, confirmed there's been a data breach. In a statement, they claim hackers may have had access to an API without authorization. While the vulnerability has already been patched, it's too little too late since so many users have been exposed. Affected users have been notified via email.People can check if their email address is in the database over on Have I Been Pwned?
Personal photos of female celebrities are once more circulating online on Reddit and 4chan, including Emma Watson and Amanda Seyfried. The images that have been leaking online since Tuesday night range from regular selfies to explicitly sexual photos. If we're to believe a screenshot from one of the original 4chan threads, more such images are about to be posted over the next few days, indicating this is just the start for The Fappening 2.0, in reference to the 2014 iCloud hacking of celebrity pictures.A rep for Emma Watson confirmed some of the stolen photos that are making rounds online are legitimate. "Photos from a clothes fitting Emma had with a stylist a couple of years ago have been stolen. They are not nude photographs. Lawyers have been instructed, and we are not commenting further," Watson's representative said.The actress is shown posing in swimsuits and various outfits, as well as fully clothed selfies of Watson and her friends. Along with these, there are also videos and images that the hackers claim to be of the actress filming herself nude in the bathtub. Since the face of the woman in the shots can't be seen, this cannot be confirmed, reports indicate.Other photos that have been posted thus far allegedly show Amanda Seyfried and Jillian Murray. These are more explicit, however, either showing them nude or engaging in sexual activities.A violation of privacyThis seems to be just the latest wave of photo theft. Back in 2014, when the Fappening happened, dozens of celebrities were hacked, and their pictures dumped online, ranging from tame images to sexually explicit pictures. Some of these were of Jennifer Lawrence, as well as Gabrielle Union and many others. The hacker has since been sent to prison.Of course, if this is just the beginning of another massive photo leak we'll know more in the next few days. Either way, it's never ok to look at these photos because it's a violation of privacy, regardless of how they ended up online. These actresses are victims of a crime, something that hackers being sentenced to prison can attest for.
Apparently, big bucks can be made selling stolen printer ink cartridges online.A dozen suspects are accused of pulling in more than US$12 million by selling the stolen cartridges and retail electronics on Amazon and eBay, New York Attorney General Eric Schneiderman said on Wednesday.Sixty-four-year-old Richard Rimbaugh allegedly led the operation for more than 20 years by recruiting people to steal the goods from retail stores across 28 states.Rimbaugh and his "theft crews" allegedly went out each week to steal new merchandise, which also included computer software, Schneiderman said.The operation was tightly organized. Members were given detailed maps of retail stores, such as Staples, Office Depot, and Best Buy, along with custom-made vests to help them shoplift the stolen goods.In addition, special electronic devices were used to deactivate the alarms at store exits and to eavesdrop on security staff. To catalog and ship the stolen merchandise, Rimbaugh created a company called American Media Soft that he ran out of his New York City apartment, Schneiderman alleged. The company appears to have received good reviews on Amazon and eBay from thousands of users.Rimbaugh then paid his crew members between 30 to 50 percent of a stolen products retail value. He would also issue credit cards to his associates to cover travel expenses such as flights, car rentals, and hotels.U.S. police have confiscated more than 5,300 stolen electronic devices and ink cartridges, along with $7.7 million from the suspects' homes and financial accounts. New York's attorney general is calling the indictments one of the biggest busts of a retail theft ring. The suspects have been charged with enterprise corruption, money laundering, and criminal possession of stolen goods. Each defendant can face between eight to 25 years in prison if found guilty.
Our network of specialist support and accompanying services are available throughout every stage of your journey to Cyber Essentials Certification.