Call us now Email a specialist
+353 1 6420100 | info@ward.ie
  • Resources
  • Blogs
  • News

    Ward Solutions Launches: Continuous Full Stack Security Testing

    If you’ve missed the webinar, no worries! You can view the recorded version below.

    Software vulnerabilities are the top external intrusion methods used in security breaches – with over 42% of breaches as a result of software vulnerabilities – source Forrester’s Global Business Technographic Security Survey 2016

    It takes just ‘one’ vulnerability to breach your network perimeter, that’s why we advise businesses to take action now by adopting a vulnerability management program. This program helps you detect, prioritise and proactively address vulnerabilities and reduce the time between discovery and remediation which helps a business with a stronger perimeter security infrastructure.

    What if we told you we built a program that will solve this for you end-to-end and the best part is it’s a 24X7 service that can be managed by us and controlled by you. We have launched a new service called ‘Continuous full stack integrated security testing’. Our subject-matter experts consist of our SOC, GRC and Penetration testing team that will utilise our pool of expertise, intellectual property, and toolsets as well as our best breed partner solutions from IBM and Qualys.

    From our study, we realized this is a major challenge for businesses today, 57% of organisations have noted an increase in the number of security incidents. We’ve seen an increase in the number of breaches in companies who thought had a secure infrastructure but as we can see apparently not. This should be a lesson for every business and not just for the compromised.

    Ward’s full stack security expert, Kenneth Murphy who is our SOC manager will educate you about our services in detail. These are the topics he will cover during this session:

    – Why do you need this? The Risks, threats and the current environment
    – Vulnerability Scan Vs Pentest
    – Application vs infrastructure testing
    – How can we help you? Our service description

    We do not believe in just preaching about what we do. We give you facts about why this is relevant to your business right now. So join in and see what kind of changes we can help you with for your security strategy in 2018.

    If you would like to speak to our security experts, contact us and we’ll be in touch with you shortly.

    News

    Ward Infosec: 5 reasons why your business maybe vulnerable!

    Here are a few facts to get started with:

    – There is a hacker attack every 39 seconds
    – 95% of breached records come from three industries: Government, Retail & Technology
    – The average cost of a breach in 2020 will exceed 150 million.

    When was the last time you conducted a security check?

    Every business today carries sensitive information about their employees and their customers. Most of the time this is stored in a system that is prone to vulnerabilities. Studies say it takes a business at least 8 months to know if they have been breached.

    Firewalls and anti-virus are not your only solution

    Our recent study says- 77% of companies fear that cybercriminals will use AI to strengthen attacks in the next 12 months. We’re living in a digital landscape that is evolving every day, the latest technologies created gives rise to a lot more opportunities for cybercriminals to strengthen attacks.

    Your employees are your biggest strengths and weakness

    It is estimated that 90% of cyber attacks are due to human error. Do you conduct phishing scams regularly and assess them with your staff? Do you monitor your employee’s activity for security purposes? There is always a possibility for an error, it’s one small gap that a hacker needs to do his job.

    Left this with the board to decide?

    The IT department is not the only one responsible for the security of a business, the board needs to get involved in understanding the importance of having tight security measures in place. This is where the CIO should break it down to the Board and explain why a certain kind of security service is relevant for the business by not getting into details but speaking their language.

    Budgets spent on GDPR only?

    We’re currently helping many businesses in their compliance journey and this is what we’ve understood, companies are more focused on GDPR and not the main objective behind it. Businesses will have to pay fines ‘not’ if they are or aren’t compliant but when they are ‘breached’.

    We built a 360-degree vulnerability management program that will solve this for you end-to-end and the best part is it’s a 24X7 service that can be managed by us and controlled by you. Our subject-matter experts consist of our SOC, GRC and Penetration testing team that will utilise our pool of expertise, intellectual property, and toolsets as well as our best breed partner solutions from IBM and Qualys.

    For more details about this service, refer to our webinar here.

    Speak to our security consultants, e-mail us or call 1800 903 552 to discuss your unique requirements.

    News

    Ward Infosec: 4 cloud security threats that need your…

    Everybody in your business is connected to the internet and you could be the next target to a data breach.
    If you look at businesses right now they hold valuable information, so where is all this data stored and who has access to this information?

    Everyone is moving to the cloud and the question is, is it safe?

    4 threats you need to know about in your cloud right now

    BYOD & BYOA

    According to Microsoft’s survey 67% of workers already use their personal devices in the workplace.
    The number of employees using their personal devices and applications in their workplace is trending upwards. This brings additional risk to the company and is done not for any malicious reasons, rather for ease convenience. In order to mitigate this risk, businesses need to start assessing the security of the cloud infrastructure with all these devices connected to it.

    Lack of Identity & Access Management

    The average enterprise uses 1,427 distinct cloud services.
    Each user in an organisation should have a single, unique and easily identified digital identity. This allows quick identification of unusual behaviour and an ability stop it as quickly as possible. If this unusual behaviour is caused by compromised credentials, the company can track the identity to find the root of the compromise. It also allows for easier auditing and reporting on behaviours and access to sensitive systems and information.

    Shared technology vulnerabilities

    The average enterprise uses 76 distinct file sharing cloud service.
    One vulnerability is all it takes to put the whole company at risk. The problem with many cloud service providers is that it allows users access to shared devices, platforms and applications and if a vulnerability is found in either one of them, that exposes them to a breach.

    Spectre & Meltdown

    80% have found the Meltdown and Spectre patching process to be unclear.
    We call these two the Bonnie & Clyde of cloud threats, patching doesn’t always run smooth even in the best circumstances. The truth is half the organisations don’t have a strategy for securing machines that can’t be patched right away. This is why we advise customers to make sure they have a back-up plan if things get ugly.

    We’re living in a world where everything is made simpler for us even in the world of security, we have tools that detect and respond to threats in a matter of seconds. Have a look at our cloud security services here that we can help you with step by step and if you’d like to speak to our security consultants, e-mail us or call 1800 903 552 to discuss your unique requirements.

    News

    Ward Infosec: Can ISO 27001 save your business?

    Only 38% of global organizations claim they are prepared to handle a sophisticated cyber-attack. The question is, are you prepared?

    Customer loyalty

    64% Data breaches impact customer loyalty.

    Problem: Currently breaches are occurring more frequently and unexpectedly. Consumers are hesitant to share their data because it could personally impact them from monetary loss, identity theft or maybe even something worse.

    Solution: With ISO 27001, you can learn exactly how to manage risks in your business by identifying threats. ISO27001 accreditation provides reassurance that these customers need to maintain customer loyalty.

    What’s the impact?

    Global average cost of a data breach: $3.62 million.

    Problem: The number of incidents are increasing daily and with organisations facing increasing budgetary requirements. The question we ask businesses is, do you have the right approach?

    Solution: One of the many benefits of having an ISO 27001 in place is that you prioritise your security needs. Our services can help your business stay secure end-to-end.

    Why might businesses be at risk?

    93% of organisations are currently using cloud services

    Today, everything is connected to the internet, whether you’re a small or big enterprise, from the janitor to the CEO can be a target for an attack. Having an accredited management program like the ISO 27001 will help the organisation manage their information security from endpoint to the cloud.

    ISO 27001 & GDPR

    A company that is ISO 27001 accredited are halfway through their GDPR journey.

    With the new regulation coming into force from May 25th one of the best practice Ward recommends is having an ISO 27001 accreditation as part of your GDPR journey.

    Why?
    The regulator will see that an organisation has implemented significant diligence in their compliance obligations either in a BAU audit or post an incident.

    Interested to know more about our ISO offering, download the whitepaper below.

    Ward has a very large pool of trained, accredited and experienced ISO27001 consultancy team that helps many businesses attain and maintain this accreditation in a timely and cost-effective manner. Speak to our ISO experts now, e-mail us or call 1800 903 552 to discuss your unique requirement.