\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

\u201cMembers trust LinkedIn with their data, and we take action to protect that trust,\u201d said a LinkedIn representative in a statement. \u201cWe have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn.<\/p>\n\n\n\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

Information that has been leaked includes full names, email addresses, phone numbers, genders, links to LinkedIn profiles, links to other social media profiles, professional titles, and other work-related data. The report further added that it is not clear whether the threat actor is selling the updated LinkedIn profiles or whether the data has been aggregated from the previous breach suffered by LinkedIn.<\/p>\n\n\n\n

\u201cMembers trust LinkedIn with their data, and we take action to protect that trust,\u201d said a LinkedIn representative in a statement. \u201cWe have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn.<\/p>\n\n\n\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

Earlier this week, Facebook was involved in a massive data breach that compromised the personal data of 533 million users. Now, there is news of another huge data leak involving LinkedIn with 500 million users\u2019 data being compromised, according to reports.<\/p>\n\n\n\n

Information that has been leaked includes full names, email addresses, phone numbers, genders, links to LinkedIn profiles, links to other social media profiles, professional titles, and other work-related data. The report further added that it is not clear whether the threat actor is selling the updated LinkedIn profiles or whether the data has been aggregated from the previous breach suffered by LinkedIn.<\/p>\n\n\n\n

\u201cMembers trust LinkedIn with their data, and we take action to protect that trust,\u201d said a LinkedIn representative in a statement. \u201cWe have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn.<\/p>\n\n\n\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

https:\/\/www.arl.army.mil\/xtechsearch\/competitions\/xtechglobal.html<\/a><\/p>\n","post_title":"US Army's xTechGlobal AI Challenge seeks winning solution for data analytics","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"us-army-seeks-ai-enabled-analytics-in-constrained-environments","to_ping":"","pinged":"","post_modified":"2021-05-07 17:47:22","post_modified_gmt":"2021-05-07 16:47:22","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=6008","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5962,"post_author":"3","post_date":"2021-05-05 17:03:53","post_date_gmt":"2021-05-05 16:03:53","post_content":"Barox is offering system designers the opportunity to learn what goes into designing cyber-secure, high-performance IP video networks that can be used for CCTV surveillance and more with its latest online seminar. The free, CDP-certified 1-hour webinar will take place on May 20th.\n\nDesigning IP Video Networks<\/em> will cover the specific requirements of Barox\u2019 video network switches, including assessing IP video network requirements; utilising existing network infrastructure; a focus on important technical basics such as, IP and PoE extenders, IEEE802.3af, at or bt, standards and beyond, network topology, fibre-optic, SFP and more; the development of a communication and cyber\/physical security concept; and defining a solid network specification.\n\nThe session will be moderated by Barox CEO Rudolph Rohr, alongside CVT Technical Director Chris Blake and CVT Commercial Director Sarah Moss.\n\nTo register for the event, click here<\/a>","post_title":"Barox offers CPD-certified IP video network design online seminar","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"barox-offers-cpd-certified-ip-video-network-design-online-seminar","to_ping":"","pinged":"","post_modified":"2023-01-23 11:44:56","post_modified_gmt":"2023-01-23 11:44:56","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5962","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5921,"post_author":"3","post_date":"2021-04-30 17:35:38","post_date_gmt":"2021-04-30 16:35:38","post_content":"Reiknistofa bankanna (RB), an IT service provider for Icelandic financial institutions, has recently overhauled its security infrastructure with Genetec Security Center. Following a project from systems integrator Hafnes Ehf, RB is now using Genetec to manage its cameras, access control and video analytics through a single interface.\n\nRB is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country\u2019s central clearance and settlement system, and a number of multi-tenant core banking solutions. RB places a very high importance on security, not only to ensure its data stays safe, but also to protect employees and visiting clients. While its server rooms and offices were protected via disparate video and access control systems, the technology was old, and maintenance was becoming both a financial and an operational burden.\n\nRB operates its solutions across multiple data centres in a shared, multi-bank environment. This requires a system that brings video and access control into a single solution. As an open unified platform, Genetec Security Center was reportedly chosen as it simplified daily security operations, allowed for further integration with other tools such as RB\u2019s heating and cooling systems, and delivered business-wide value.\n\n\u201cFrom day one we wanted a unified system which could help our teams understand the situation quickly; alerting them if anything required their attention,\u201d said Geir S\u00e6mundsson, Datacentre Manager at Reiknistofa bankanna. \u201cThe Genetec solution does just this and is allowing us to build-in customised alerts so we gain business intelligence \u2013 providing us with better ROI.\u201d\n\n\u201cPhysical security teams are demanding simplicity and greater functionality,\u201d added Anthonie van der Ploeg, Director of Sales for Benelux & Nordics at Genetec. \u201cUnification can offer them both by bringing together all security system components seamlessly in a single software platform in a way that can vastly improve security management. We are delighted that Iceland\u2019s Reiknistofa Bankanna has experienced the deep business insights Genetec Security Center is capable of delivering and we look forward to supporting them as they evolve and grow their operations.\u201d\n\n\u201cThe time savings delivered by Genetec have been immense,\u201d concluded S\u00e6mundsson. \u201cIt\u2019s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed. Considering its ease of use, deep integration and leading analytics, we look forward to continuing the partnership over the coming years.\u201d\n\nwww.genetec.com<\/a>","post_title":"Genetec protects Iceland\u2019s financial services backbone","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"genetec-protects-icelands-financial-services-backbone","to_ping":"","pinged":"","post_modified":"2023-01-23 10:33:37","post_modified_gmt":"2023-01-23 10:33:37","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5921","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5586,"post_author":"48","post_date":"2021-04-10 11:00:00","post_date_gmt":"2021-04-10 10:00:00","post_content":"\n

Earlier this week, Facebook was involved in a massive data breach that compromised the personal data of 533 million users. Now, there is news of another huge data leak involving LinkedIn with 500 million users\u2019 data being compromised, according to reports.<\/p>\n\n\n\n

Information that has been leaked includes full names, email addresses, phone numbers, genders, links to LinkedIn profiles, links to other social media profiles, professional titles, and other work-related data. The report further added that it is not clear whether the threat actor is selling the updated LinkedIn profiles or whether the data has been aggregated from the previous breach suffered by LinkedIn.<\/p>\n\n\n\n

\u201cMembers trust LinkedIn with their data, and we take action to protect that trust,\u201d said a LinkedIn representative in a statement. \u201cWe have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn.<\/p>\n\n\n\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n

The deadline to submit a white paper proposal is 12 May 2021, where up to ten finalists of this round will win $10,000 each.<\/p>\n\n\n\n

https:\/\/www.arl.army.mil\/xtechsearch\/competitions\/xtechglobal.html<\/a><\/p>\n","post_title":"US Army's xTechGlobal AI Challenge seeks winning solution for data analytics","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"us-army-seeks-ai-enabled-analytics-in-constrained-environments","to_ping":"","pinged":"","post_modified":"2021-05-07 17:47:22","post_modified_gmt":"2021-05-07 16:47:22","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=6008","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5962,"post_author":"3","post_date":"2021-05-05 17:03:53","post_date_gmt":"2021-05-05 16:03:53","post_content":"Barox is offering system designers the opportunity to learn what goes into designing cyber-secure, high-performance IP video networks that can be used for CCTV surveillance and more with its latest online seminar. The free, CDP-certified 1-hour webinar will take place on May 20th.\n\nDesigning IP Video Networks<\/em> will cover the specific requirements of Barox\u2019 video network switches, including assessing IP video network requirements; utilising existing network infrastructure; a focus on important technical basics such as, IP and PoE extenders, IEEE802.3af, at or bt, standards and beyond, network topology, fibre-optic, SFP and more; the development of a communication and cyber\/physical security concept; and defining a solid network specification.\n\nThe session will be moderated by Barox CEO Rudolph Rohr, alongside CVT Technical Director Chris Blake and CVT Commercial Director Sarah Moss.\n\nTo register for the event, click here<\/a>","post_title":"Barox offers CPD-certified IP video network design online seminar","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"barox-offers-cpd-certified-ip-video-network-design-online-seminar","to_ping":"","pinged":"","post_modified":"2023-01-23 11:44:56","post_modified_gmt":"2023-01-23 11:44:56","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5962","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5921,"post_author":"3","post_date":"2021-04-30 17:35:38","post_date_gmt":"2021-04-30 16:35:38","post_content":"Reiknistofa bankanna (RB), an IT service provider for Icelandic financial institutions, has recently overhauled its security infrastructure with Genetec Security Center. Following a project from systems integrator Hafnes Ehf, RB is now using Genetec to manage its cameras, access control and video analytics through a single interface.\n\nRB is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country\u2019s central clearance and settlement system, and a number of multi-tenant core banking solutions. RB places a very high importance on security, not only to ensure its data stays safe, but also to protect employees and visiting clients. While its server rooms and offices were protected via disparate video and access control systems, the technology was old, and maintenance was becoming both a financial and an operational burden.\n\nRB operates its solutions across multiple data centres in a shared, multi-bank environment. This requires a system that brings video and access control into a single solution. As an open unified platform, Genetec Security Center was reportedly chosen as it simplified daily security operations, allowed for further integration with other tools such as RB\u2019s heating and cooling systems, and delivered business-wide value.\n\n\u201cFrom day one we wanted a unified system which could help our teams understand the situation quickly; alerting them if anything required their attention,\u201d said Geir S\u00e6mundsson, Datacentre Manager at Reiknistofa bankanna. \u201cThe Genetec solution does just this and is allowing us to build-in customised alerts so we gain business intelligence \u2013 providing us with better ROI.\u201d\n\n\u201cPhysical security teams are demanding simplicity and greater functionality,\u201d added Anthonie van der Ploeg, Director of Sales for Benelux & Nordics at Genetec. \u201cUnification can offer them both by bringing together all security system components seamlessly in a single software platform in a way that can vastly improve security management. We are delighted that Iceland\u2019s Reiknistofa Bankanna has experienced the deep business insights Genetec Security Center is capable of delivering and we look forward to supporting them as they evolve and grow their operations.\u201d\n\n\u201cThe time savings delivered by Genetec have been immense,\u201d concluded S\u00e6mundsson. \u201cIt\u2019s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed. Considering its ease of use, deep integration and leading analytics, we look forward to continuing the partnership over the coming years.\u201d\n\nwww.genetec.com<\/a>","post_title":"Genetec protects Iceland\u2019s financial services backbone","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"genetec-protects-icelands-financial-services-backbone","to_ping":"","pinged":"","post_modified":"2023-01-23 10:33:37","post_modified_gmt":"2023-01-23 10:33:37","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5921","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5586,"post_author":"48","post_date":"2021-04-10 11:00:00","post_date_gmt":"2021-04-10 10:00:00","post_content":"\n

Earlier this week, Facebook was involved in a massive data breach that compromised the personal data of 533 million users. Now, there is news of another huge data leak involving LinkedIn with 500 million users\u2019 data being compromised, according to reports.<\/p>\n\n\n\n

Information that has been leaked includes full names, email addresses, phone numbers, genders, links to LinkedIn profiles, links to other social media profiles, professional titles, and other work-related data. The report further added that it is not clear whether the threat actor is selling the updated LinkedIn profiles or whether the data has been aggregated from the previous breach suffered by LinkedIn.<\/p>\n\n\n\n

\u201cMembers trust LinkedIn with their data, and we take action to protect that trust,\u201d said a LinkedIn representative in a statement. \u201cWe have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn.<\/p>\n\n\n\n

\u201cThis was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review. Any misuse of our members\u2019 data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven\u2019t agreed to, we work to stop them and hold them accountable.\u201d<\/p>\n\n\n\n

In response to the recent breach, George Papamargaritis, MSS Director, Obrela Security Industries says: \"In the last week we have witnessed two of the world\u2019s leading social platforms suffer data disclosures as a result of website scraping. Both incidents highlight the lengths and time cyber criminals will put into building profiles on internet users to carry out attacks or sell their data. <\/p>\n\n\n\n

\"LinkedIn is still investigating the breach but it will be interesting to see how it responds to the incident and whether it believes users that have been impacted need to be informed. Anyone who has been impacted by this latest incident should be extra vigilant for phishing attempts, where cybercriminals will use the information obtained to make their scams look genuine. While no financial information was stolen, cybercriminals could use the information to tailor phishing scams to make them feel more authentic, which will provide them with an avenue to monetise on the data.\" <\/p>\n\n\n\n

Preventing website scraping <\/strong><\/p>\n\n\n\n

While social media companies do have tools in place that aim to prevent scraping on their platforms, it still remains an issue for many organisations. Threat Intelligence Analyst at Talion, Lewis Jones adds: \"Completely preventing website scraping can be difficult, Facebook has found this and had to make significant changes to how its platform worked to minimise this. <\/p>\n\n\n\n

\"Ultimately, it becomes a balance between how much information you want to make publicly available and locking down your website. The simplest way to prevent a website from being scraped is to block multiple requests from the same IP address. Other methods like requesting login credentials for access, using CAPTCHAs, and changing the website's HTML settings regularly can also be effective.\u201d<\/p>\n\n\n\n

Niamh Muldoon, Global Data Protection Officer at OneLogin suggests the argument that all of this information is in the public domain, so is it technically an unauthorised disclosure, incident or breach. Muldoon continues: \"On the other hand, the consent to use this contact information is clearly where the privacy is breached, as these impacted individuals will not have given permission for their data to be shared and\/or used for the various sales or marketing activities and worryingly, for dark web activities such as social engineering and phishing.<\/p>\n\n\n\n

\"Trust and Security brand leaders will always be fully transparent as to the use of contact information, including consent, and take proactive measures to protect their end-users and customers contact data. It is their responsibility to do so in order to prevent cybersecurity risks such as phishing and\/or other social engineering threats.\"<\/p>\n\n\n\n

Data defence<\/strong> <\/p>\n\n\n\n

Sam Curry, Chief Security Officer, Cybereason says: \u201cThe challenges of protecting data are growing exponentially because the problem is one of rates. The attackers are improving their proficiency at a faster rate than defenders, and what you are seeing now is the result of that being true for a while. We must find a way to leap ahead in defence and to change the rates or this will become a major drag on the tech engine for our economy.\u201d<\/p>\n\n\n\n

\u201cWhile it initially appears that no sensitive information, such as financial data, has been obtained, LinkedIn IDs, full names, email addresses, phone numbers does appear to have been collected by the attackers. My advice for users who may be affected is to change your password to a strong password, enable two factor authentications, be wary of unexpected connection requests, be wary of Phishing emails\/messages and finally ensure you keep anti-virus software up to date.\u201d<\/p>\n","post_title":"Data breach roundtable | LinkedIn shadows Facebook\u2019s error","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"data-breach-roundtable-linkedin-shadows-facebooks-error","to_ping":"","pinged":"","post_modified":"2021-04-15 14:41:59","post_modified_gmt":"2021-04-15 13:41:59","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5586","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":5064,"post_author":"43","post_date":"2021-02-24 17:41:32","post_date_gmt":"2021-02-24 17:41:32","post_content":"FSP's Fab Secure security covers are being installed at London9, a Virtus Data Centre in Slough, to help keep important data and IT infrastructure safe and secure. 21 of the manufacturer's flush fitting solid top covers will be used at the facility, which has 10,000 square metres of technical data centre space and 24MW of IT load capacity. London9 will be used to store sensitive, business critical data for companies and organisations, so making sure the site is secure is absolutely essential.\n\nWith this in mind, the operators Virtus have chosen to fit the Fab Secure Flush Fitting covers, with a 600x600mm clear opening. The hinged covers have torsion spring assist openings, a neoprene seal to prevent the ingress\/egress of liquid or gases and an internal hinged ladder-style grill to prevent access. The covers also have a recessed padlock facility and will be supplied with heavy duty Abloy PL350 padlocks for added security.\n\n\u201cFSP has gained a reputation in providing high security products for critical asset protection and our Fab Secure range has been used by the utility and water industries for many years to secure their assets,\" said Managing Director Richard Hilton. \u201cNow, Big Data is such big business that data centres need that same level of protection, and we were more than happy to provide our most secure solution to VIRTUS to give them peace of mind that their clients\u2019 data is safe.\u201d\n\nwww.fsp.co.uk<\/a>","post_title":"FSP provides maximum security for Big Data facility","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"fsp-provides-maximum-security-for-big-data-facility","to_ping":"","pinged":"","post_modified":"2021-02-24 17:41:34","post_modified_gmt":"2021-02-24 17:41:34","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=5064","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3584,"post_author":"3","post_date":"2020-10-19 11:54:41","post_date_gmt":"2020-10-19 10:54:41","post_content":"Amthal explains how it can help to ensure compliance with latest standards and works in partnership with building and facility managers to manage fire safety and security.","post_title":"Delivering compliant fire safety and security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"delivering-compliant-fire-safety-and-security","to_ping":"","pinged":"","post_modified":"2020-10-19 11:54:42","post_modified_gmt":"2020-10-19 10:54:42","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3584","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3335,"post_author":"3","post_date":"2020-10-16 16:42:26","post_date_gmt":"2020-10-16 15:42:26","post_content":"Stanley Security explores the changing world of data centre projects, covering everything from concept to design, installation to operations and upgrades.","post_title":"Exploring the future of data centres","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"exploring-the-future-of-data-centres","to_ping":"","pinged":"","post_modified":"2020-10-16 16:42:28","post_modified_gmt":"2020-10-16 15:42:28","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3335","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3299,"post_author":"3","post_date":"2020-10-16 16:14:40","post_date_gmt":"2020-10-16 15:14:40","post_content":"Scalable Security from  Boon Edam has been designed to enable security professionals to select the level of security they require for their entrance points.<\/span>","post_title":"Boon Edam introduces Scalable Security","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"boon-edam-introduces-scalable-security","to_ping":"","pinged":"","post_modified":"2020-10-16 16:15:07","post_modified_gmt":"2020-10-16 15:15:07","post_content_filtered":"","post_parent":0,"guid":"http:\/\/securityonscre.wpenginepowered.com\/?p=3299","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"prev":false,"total_page":1},"paged":1,"column_class":"jeg_col_2o3","class":"epic_block_14"};

\n