News

Striving towards a more effective approach to cybersecurity in Europe: ENISA

The DSM meeting of the past 12th December provided remarkable outcomes to pave the way for a more efficient cybersecurity strategy and  the adoption of a voluntary European cybersecurity certification framework in Europe.

Top 7 predictions for cybersecurity in 2018: preventive strategies for SMEs and organisations

The business world is increasingly networked and relies on networked systems and on cloud-data storage more than ever. The coming year is expected to bring even more connectivity, increasing amounts of data and digital transformation initiatives for companies worldwide. This fast-changing scenario will entail new cybersecurity threats and aspects that need to be addressed accordingly.  

TYPES: helping users in the current quest for privacy & data protection

Types aims to safeguard the individual’s privacy and put them in control of how their data is handled by providers for commercial or advertising purposes. Types also allows users to verify in a simple way if their online rights are adequately safeguarded and if personal data is exchanged for useful reason, and namely to deliver added-value to the end-user.

Digital Opportunity – a call for SMEs to provide digital skills for Europe

Today, the European Commission launched Digital Opportunity, a new initiative to fund cross-border traineeships in ICT companies. Young ICT professionals that enroll in the program will receive an allowance of 500 euros per month. By this initiative, the Commission aims at training additional new ICT practitioners to cope with the shortage of skilled workforce in the digital economy.

SAINT survey on cybersecurity and cybercrime

The SAINT project aims at tackling the issue of failures in cybersecurity through a multifaceted approach that goes beyond the sole technical standpoint. Building upon the valuable oucomes and research of previous projects, Saint combines these insights together to further advance into economic, behavioural, societal and institutional views with a view to pursue new methodologies to improve efficiency and cost-effectiveness of cybersecurity.

The most alarming cybersecurity threats for SMEs

Small businesses may consider themselves too little to appeal as an inviting target for cyber-attacks. They could not be more mistaken. Indeed, they face the same (if not greater) risk of being a victim of cyber-crime. Surprisingly, two out of three UK small firms suffered hacker’s attacks between 2014-2016 (as reported from Federation of Small Businesses).

Why Ransomware poses such a threat for SMEs

Ransomware attacks have become an increasing trend worldwide over the past two years. Just six months ago, for example, a ransomware called "Wannacry" stormed the entire web wrecking most damages in Europe. The ways in which any individual can be affected by this kind of virus are multiple: through email attachments, malicious links, a compromised ad or an exploit kits. Exploit kits act as true Trojan horses by searching for any weakness or entry point in a computer (usually old or not updated software) to install the ransomware.

The rising urgency of Cybersecurity: why this should be a top priority for organisations

We live in an increasingly interconnected world of both citizens and public infrastructures with a growing associated risk of cyber-attacks. Robust protection is no longer just an option. Today, cyber-risk is one of the major concerns sitting at the top of the international agenda of any government, as hacker’s attacks or security breaches have the potential to jeopardize the global economy.

Data protection in the current IT landscape

Numerous companies and organisations struggle when it comes to understanding how to deal with cybersecurity and data protection issues. However, the vast majority are aware that they have to put effective strategies in place to safeguard their business from cybercriminal attacks.

The amount of online services and the ensuing exchange of personal data are constantly on the rise, with present business models relying on cutting-edge IT services and connectivity to meet consumer demand. With connectivity comes potential threats from external sources.

Guidelines on the application of Article 28 of GDPR

Under Article 28 of the General Data Protection Regulation (“GDPR”), controllers must only appoint processors who can provide “sufficient guarantees” to meet the requirements of the GDPR. Processors must only act on the documented instructions of the controller and they can be held directly responsible for non-compliance with the GDPR obligations, or the instructions provided by the controller, and may be subject to administrative fines or other sanctions and liable to pay compensation to data subjects.

Pages

News

Outcomes and key themes from ICT 2018 Session on Cybersecurity as key for a Digital Economy and Society

On 5 December 2018, the Digital Single Market of the European Commission sponsored a session on the topic of “Cybersecurity as key for a Digital Economy and Society”. The highly-popular session (over 90 attendees) took place on 5 December 2018 within the flagship ICT2018 Conference in Vienna, Austria.

Khalil Rouhana, Deputy Director General, EC – DG CNECT, kicked off the session with an overview of some of the most pressing issues of the day in cybersecurity:

Events

17/01/2019
Reinforcing Cyber Security in the EU: Building Coordinated Security, Confidence and Capability in the Cyber Domain

With 315 million Europeans using the internet each day, the provision of critical services and the functioning of a modern economy are now entirely dependent upon the robustness and safety of cyberspace and its infrastructure. Cyber security attacks are a growing source of threat and concern, while also representing a growing economic opportunity for Europe, with the market predicted to be worth over $100 Billion by 2018 (European Commission). Moreover, cyber attacks in the EU are constantly growing in both their frequency (quintuplicate between 2013 and 2017) and sophistication.