Connecting to LinkedIn...



Cyber security – reducing risks and making resolutions for 2015

16/12/2014 by Sharon Shahzad


Cyber security and the process of ensuring the integrity and confidentiality of vital data is a business activity that, like big data analytics, has taken on a whole new meaning for modern businesses in 2014. As the recent hack on Sony Pictures shows, attacks, hacks, threats and viruses are more sophisticated than ever before. They also require greater resources and more focused and agile response plans to guard businesses against them. Despite this, over a fifth of firms in the UK still admit they are unprepared.

Trustwaves latest 'state of risk' report said 21% of organisations either do not have a sufficient incident response procedure in place or do not test them even if they do. This negligence is compounded by the fact that the majority also do not have any policy regarding the 'bring your own device' trend. According to mobile-app security solutions provider Checkmarx, “mobile apps serve as a portal to your business' system as well as your customers' phones." It is vitally important that technical and policy controls are implemented to govern this activity so business and customer data and your reputation are not put at risk.

A further study by Ponemon Institute identifies a disconnection between the sheer scale of cyber risks that are being acknowledged by businesses and their efforts to procure a solution. While threats expand exponentially, few organisations have noted an improved security posture in combating hacks and attacks in the last 12 months. In fact, a third say they are becoming less effective. This is due to a scarcity of in-house employees with security expertise, which is hindering their efforts to identify and contain malicious traffic on networks.

With 2015 on the horizon, all businesses should be making cyber security resolutions for the next 12 months. Cybercriminals are targeting businesses of all sizes in every sector. If you are a small or medium sized firm it can be difficult to mobilise resources and recover from the impact of a breach. In fact, Experian has found that over half of SMEs shut down just six months after suffering a cyber attack. With this in mind, businesses should be testing their security systems, securing their mobile apps, checking third-party vendor vulnerabilities, investing in the right technology, improving passwords and budgeting for all these aspects accordingly.

Trustwave Vice President Michael Aminzade concludes: “Business must look at security as a business-as-usual imperative. Understanding their risk level is the first step. By identifying their largest security shortfalls and rectifying them, businesses can stay ahead of the criminals and decrease their risk of getting breached."

This article is written by Jack Skinner - Consultant - Cyber Security, if you have any questions or would like a detailed discussion about your recruitment requirements for 2015, please contact Jack on: +44 (0)20 7014 0230 or send an email to

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technology, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News


Humans remain largest security flaw in cloud ...

2016-10-21 14:00:00 +0100

With a vast number of companies moving some, if not all, of their operations to the cloud, security continues to be of major concern. Whilst there are numerous patches and firewalls to safeguard defences, it has been highlighted that the most difficult area to protect against is human interaction. This is the view of Jamie Woodruff, a penetration tester and ethical hacker. Woodruff’s views come after he was contracted to conduct a penetration test in or...


Offshore exploration providing boost for oil ...

2016-10-19 09:00:00 +0100

The oil and gas industry has had a notoriously challenging time of late, with the prices of oil plummeting and causing many firms to tighten their belts. However, offshore exploration is providing a much-needed bright spot for the sector, with an increasing number of governments becoming more accommodating. In the past week, it has been revealed that there are big changes afoot for Brazil’s petroleum laws. Shell has already begun to move on this opportu...