This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Print page

Hot topics

   

Insights

  • Five questions on the evolution of cyber security
    This issue of Risk Angles discusses how an evolutionary approach to cyber security is key to staying ahead of cyber criminals and the competition.
  • No such thing as hacker-proof
    Many organisations may have a false sense of security, perhaps even complacency, resulting from their investments in non-agile security tools and processes they have relied on for years. They are failing to detect long-dwell cybercrimes in their IT environments and misallocating limited resources to lesser, more generic threats. Basic security blocking and tackling is valuable, but is in no way sufficient.
  • Your cyber attack mitigation?
    Your infrastructure is no longer a closed system with a single managed gateway to the outside world. A cyber attack that disrupts communications and prevents the use of one or more systems could have a serious impact on business operations. Having a cyber attack mitigation strategy defined prior to an attack allows organisations to respond efficiently, consistently and reasonably to the event.
  • Top priority for CEOs
    Hyperconnectivity and the evolution in cyber attacks require CEOs to take greater ownership of cyber risk management. Chief executives are encouraged to commit to Principles for Cyber Resilience.
  • What you don’t know could hurt you
    Could it happen to us? Alarmed by an uptick in cyber attacks on high-profile businesses, many boards of directors are asking their executive teams just that question. Unfortunately , at most companies, the short answer may well be that it’s already happening.
  • Five questions about managing cyber risk
    With cyber attacks becoming more common, companies are taking a closer look at how their organizations manage and mitigate potential cyber threats.

Research

A more secure consumer?

A more secure consumer?
With over 4.6M UK consumers falling victim to online crime and 30% claiming to be victims of cybersquatting less than half of UK consumers trust companies data security procedures. Find out Deloitte’s perspectives on how consumer businesses should rethink their cyber security strategy .

P@$$1234: The end of strong password-only security

P@$$1234: The end of strong password-only security
In 2013 more than 90 percent of user-generated passwords, even those considered strong by IT departments, will be vulnerable to hacking. Inadequate password protection may result in billions of dollars of losses, declining confidence in Internet transactions and significant damage to the reputations of the companies compromised by attacks.

Blurring the lines: Information security in a world without boundaries

Blurring the lines
Welcome to our sixth annual worldwide study report of information security practices in Technology, Media, and Telecommunications (TMT). Information security challenges continue to make headlines. To find out what businesses are doing to fight back, we surveyed executives from over 120 of the world’s largest TMT companies. The results are both surprising and enlightening.

Breaking Barriers
Read Deloitte’s eighth survey report into information security practices in the financial services industry. Released in September 2012, it looks at key findings such as the removal of barriers to achieve stronger information security relationships, the adoption of new technologies and the increasing need to police cyber threats.

 

Key contacts

Mike Maddison Mike Maddison
Head of Cyber Security,
EMEA Partner
+44 20 7303 0017
mmaddison@deloitte.co.uk
   
James Nunn-Price James Nunn-Price
Cyber Lead,
UK Partner
+44 20 7303 8708
jnunnprice@deloitte.co.uk

 

Related insights

Cyber Security. Evolved.   Cyber Security. Evolved.
Learn more about how you can improve your cyber security strategy.
     
IT risks and security challenges   IT risks and security challenges
A series of Deloitte perspectives as published in the Wall Street Journal. 
     

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options
Follow:

Get in touch

More on Deloitte