New ways of working demand stronger cyber security

Over the last few years, the rapid shift to remote work and use of smart devices has dramatically changed how organisations and employees use information technology. Many staff are now highly mobile and work from multiple locations including home or public networks. The change has ushered in a range of security threats as criminals look to leverage personally identifiable information and gain financially from unsuspecting targets.

Consequently, traditional IT security practices are no longer enough. We must strengthen protection directly at the endpoint – the servers, laptops, desktops, smartphones and tablets we use – and not focus merely on the network.

Past protections

Before our working practices changed – and more businesses adopted remote working and cloud service – organisations often managed cyber threats using a perimeter firewall with one or more secure internal networks. Beyond that, they would use a ‘demilitarised zone’ (DMZ) network to house internet-facing services such as email or web servers. This provided extra security and separation from internal systems holding confidential information.

Falanx Cyber Security Limited (LON:FCS) provides enterprise-class cyber security services and solutions. They deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services. 

Click to view all articles for the EPIC:
Or click to view the full company profile:
    Facebook
    Twitter
    LinkedIn
    Falanx Cyber Security plc

    More articles like this

    Falanx Cyber Security plc

    Managed Detection & Response (MDR)

    Falanx’s fully-managed detection and response service means you don’t need a team of in-house security experts to trawl through security alerts or race to respond to suspicious activity at 3.a.m. From our Security Operations Centre (SOC)

    DirectorsTalk

    NCSC highlights threat to UK critical infrastructure

    In its seventh Annual Review, the National Cyber Security Centre (NCSC) has emphasised the ongoing and serious nature of the threat to the United Kingdom’s critical infrastructure. The NCSC, a branch of GCHQ, used this opportunity

    Falanx Cyber Security plc

    4 signs you’re falling behind on cybersecurity

    Security compliance (and particularly ISO 27001) is like the project in school you had the whole year to complete — and ended up starting in a panic the night before. Given the time, resources, and complexity of

    Falanx Cyber Security plc

    Five things utilities need to know about cyber-security

    The scope of cyber-security regulations in the UK will increase as the Government updates its Network and Information Systems (NIS) legislation in the coming months. That’s in response to developments in Europe, where an NIS 2

    Falanx Cyber Security plc

    Key highlights from the 2023 UK cyber crime landscape

    It’s 2023, and the landscape of cybercrime in the United Kingdom is evolving unprecedentedly. This year’s cyber threat landscape is shaped by many factors, from the continuing effects of the global pandemic to the ever-expanding digital

    Falanx Cyber Security plc

    Incident management vs. incident response explained

    While even many seasoned cybersecurity leaders use the terms ‘incident management’ and ‘incident response’ interchangeably, they aren’t technically synonymous. How effectively an enterprise handles a cybersecurity incident has a significant effect on how much damage occurs

    Falanx Cyber Security plc

    Almost half of UK businesses experience a cyber attack

    The findings are part of Hiscox’s Cyber Threat Ranking Table, which uses data from the latest Hiscox Cyber Readiness Report to identify which industries are most at risk of a cyber-attack. The rankings are informed by data

    Falanx Cyber Security plc

    How to protect sensitive school data during a cyberattack

    The CFO of a Texas school district recommends safer ways to request sensitive employee data and stronger password and verification policies. Over the last five years, global ransomware attacks against K-12 and higher education institutions —

    Falanx Cyber Security plc

    The crucial role of cybersecurity in a digital world

    Digitalisation has propelled countless businesses to increased efficiency and profitability. But with this has come an elevated risk of cyberattacks on SMEs. According to research and advisory company Gartner, 91% of businesses are engaged in some form

    Falanx Cyber Security plc

    UK at risk of massive security breach from national IT meltdown

    The UK is at risk of a massive security breach that could see bank account details and national insurance numbers leaked because of the government’s failure to upgrade Whitehall’s ageing computer system, The Independent can reveal. HM Revenue and Customs (HMRC) has

    Falanx Cyber Security plc

    Physical pen testing methods and tools

    Companies should periodically conduct physical penetration tests to assess the security posture of their office and data center and find any vulnerabilities. Physical security testing, while not as common as software or network pen testing, shows organizations

    Falanx Cyber Security plc

    Cybersecurity breaches in UK pensions sector soar more than 4,000%

    Cybersecurity breaches reported by British financial services companies more than tripled in the 12-month period ending June 30, with the pension sector reporting the biggest increase at 4,000%, according to research from international law firm Reynolds Porter

    Falanx Cyber Security plc

    Rob Shapland on physical penetration testing

    Falanx Cyber Security Limited (LON:FCS) provides enterprise-class cyber security services and solutions. They deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services. 

    Falanx Cyber Security plc

    Mitigating the risk of cyberattacks: Best practices for businesses

    In today’s digital landscape, cybersecurity plays a critical role in safeguarding our personal and professional lives. As we navigate the online realm, cybercriminals continuously seek opportunities to exploit vulnerabilities for their own gain. This article explores