ICAEW.com works better with JavaScript enabled.

Cyber security industry press

The Library & Information Service provides a hand-picked collection of industry press articles on cyber security as a benefit of ICAEW membership.

If you are unable to access an article, please see our Help and support or contact library@icaew.com

ICO criticises government-backed campaign to delay end-to-end encryption

The article reports that the Information Commissioner's Office (ICO) has stepped into the debate over end-to-end encryption (E2EE), warning that delaying its introduction leaves everyone at risk – including children. It mentions that the privacy watchdog said end-to-end encryption plays an important role in safeguarding privacy and online safety, protecting children from abusers, and is crucial for business services.

Cybersecurity and forensic accounting join forces to combat criminals

How the skill sets of cybersecurity and forensic accounting experts can intertwine and be used collaboratively when cybersecurity issues come to light.

Cloud storage compliance pitfalls

Article outlines post-Brexit cloud storage compliance issues that could be an issue for organisations. These include the Data Protection Act 2018, the Payment Card Industry Data Security Standard (PCI DSS) and the Network and Information Systems (NIS) Directive.

The critical first step to data security

The article discusses the essential data security strategies that management accountants can use in applying business performance measurement skills in the identification of key performance indicators (KPI) for data security and classification. Topics include the IBM data showing that data breach average cost stood at 4.24 million dollars in 2020, and the importance of data classification as the foundation of data security.

UK data regulations set for 'common sense' changes

Article reports on the launch of a major conultaion by the Department for Digital, Culture, Media and Sport (DCMS), centring on proposed changes to the UK’s data protection regime in a post-Brexit environment, alongside reforms to the Information Commissioner’s Office (ICO).

How do SOAR and SIEM fare in a rapidly changing cyber threat landscape

Article discusses whether SOAR (security orchestration, automation and response) and SIEM (security information and event management) technologies are still effective tools for IT security as cyber threats grow.

How internal audit helps increase cybersecurity transparency for the board

Article discusses how internal audit can help the board see an accurate picture of cyber risk

Best practices for safe printing

Article discusses how the humble printer is an often overlooked cyber security risk in any office, offering hackers backdoor access into the corporate network. Best practice recommendations are made.

How to get users to pay heed to security training

Article discusses how business can get their staff to take growing cyber security risks and the resulting training seriously.

Cybersecurity from within

Article discusses internal IT security threats and how these shouldn't be left to the IT department and should b addressed by an organisation's internal controls.

Showing 10 of 102 items

* Some of the content on this web page was provided by the Chartered Accountants’ Trust for Education and Research, a registered charity, which owns the library and operates it for ICAEW.