BYOD – Making the Workplace Revolution Work for You

BYOD or Bring Your Own Device, is a practice that challenges IT and Security Departments of enterprises globally.  Ever since 2009 when BYOD was what the cool kids in Silicon Valley did, this stealthy revolution has been stalking businesses large and small. Whilst large companies see the potential and all the security pitfalls, for small companies BYOD can be the only way they can operate. When Layer 8, was at the conceptual stage, and before we had any real clients, we had no choice BUT to use our own devices for business purposes. What I am I talking about?  Bring … Read More

Keeping sharing simple...

NHS Cyber Attacks – Simple Tips to Protect Your Business

I’m quite sure every security blogger on the globe is frantically sitting at their computer hammering out a blog related to the NHS cyber-attacks. Well Layer 8 are no different, but instead of scrutinising what happened, enough of the scare stories and techno babble, we want to focus on what can be learnt from this, and what we might be able to do to protect our businesses. Positive Outcome no.1 – Cyber will become a real business issue For too long IT and Security managers have struggled to get airtime when it comes to protecting their business. Board members, with … Read More

Keeping sharing simple...

Measure return on investment in security culture/behaviour change? Impossible?

If you regularly read our blogs, you will know that we discuss a different approach to this subject. One of collaboration, dialogue and integration. Out of collaboration emerges a position only the savviest of Security Professionals have achieved. That position is one of true integration, a position where security is correctly considered as part of the strategic direction of your business. The Security Team have become strategists rather than fixers. So what’s collaboration got to do with measurement? What a collaborative approach to security strategy produces is relationships. Relationships at every level and every department across your business. People to … Read More

Keeping sharing simple...

Security Awareness Lacks a Rogues’ Gallery – So Let’s Play Hackers

When we were kids there were numerous ways to play a ‘goodie’ or a ‘baddie’ but we quickly learnt that heroes and villains were co-dependent. There was no earthly point in wandering around being evil if a group of co-operative saps weren’t available to receive the fruits of your dastardly plots. Likewise, being good (always the less favoured and less interesting role) gets a whole lot more boring if the villains don’t show up. The Relative Merits of ‘Good’ and ‘Bad’ We played these games to learn the rules; of course, villains had all the fun because they broke every … Read More

Keeping sharing simple...

‘Joining the Dots’ for Effective People-Centred Cybersecurity

At Layer 8 we find ourselves talking to people about cybersecurity every day, and it’s rare that we meet someone who isn’t passionate and committed to doing a better job of securing personal and business assets from data breach, phishing and ransomware. The meetings we have tend to fall into two categories; we provide workshops for end-users on a range of cyber-security topics, and we spend a good deal of time talking to security professionals about developing effective security culture, founded on proactive security behaviours. We All Want Better Cybersecurity… The surprising thing is that the conversations in both instances, … Read More

Keeping sharing simple...

Five Reasons to Welcome GDPR

2017 has heralded an intensification of speculation and opinion regarding GDPR, and Google searches in this area have been steadily rising over the past few months. This is hardly surprising given that the stakes are high for businesses facing huge fines, come May 2018, if they either fail to report a data breach of personally identifiable data within 72 hours, or are unable to demonstrate that their systems and operations of data governance a sufficient to the risk that data poses. What is more surprising, perhaps, is the emphasis upon the difficulties posed to businesses that now have to put … Read More

Keeping sharing simple...

The Day the Toaster Turned – an IoT Apocalypse

In security circles they’re already talking about an ‘IoT Zombie Apocalypse’ and that’s got me thinking about whether a zombie army made up of fridges, cameras, toasters, and thermostats could be as bad as the clambering and crawling, flesh-desiring, cadaverous zombies we’ve grown used to since George Romero redefined the genre back in the 1970s. So, let’s compare: So, there we have it; the IoT zombies may look prettier but the dark forces they unleash could end civilisation just as effectively – and probably more efficiently – that their distant rotting cousins. Think this sounds a bit far-fetched? Well in … Read More

Keeping sharing simple...

Developing Security Culture through Behaviours and Conversations

Conversation, collaboration and collective policy making will be discussed in our webinar – The Human Factor: Embedding Security Behaviours for Cyber-Aware Culture – on Tuesday 29th November. If this blog whets your appetite, sign up for it on our website.  We’re all part of our organisation’s culture and we shape it through our conversations and behaviours. Culture change, by its very nature, therefore, is innately collaborative and has to be inclusive. Rules imposed from above don’t work because they exclude people from the process of culture change. Switching from a culture of instruction to one of conversation generates the movement … Read More

Keeping sharing simple...

A Simple Solution to the Phishing Crisis

Finding a Space to Talk About Security At Layer 8 we spend a lot of our time having conversations with groups of employees about what it means to be a protector of digital information at home and at work. We always start our sessions by explaining that we won’t be showing a PowerPoint and we won’t be talking about rules; what we aim to do is to clear a space to allow us to talk about our shared attitudes towards security, be honest about what we don’t know, and find some security behaviours that we can all buy into. The … Read More

Keeping sharing simple...

Adopting a New Security Behaviour in 3 Foolproof Steps

Adopting a New Security Behaviour in 3 Foolproof Steps October is National Cyber Security Awareness Month or #NCSAM as it’s known on Twitter. Twitter showcased many pics and tweets of awareness sessions and there are hundreds of  links to helpful documents. Now October is nearly over, and #NCSAM won’t be trending, if it ever was, until next year. So what has it achieved? Did it actually raise awareness? To those questions I can answer ‘Yes!’. More people have awareness of cyber, and – thanks to organisations such as GetSafeOnline who put on events throughout the month – more people know … Read More

Keeping sharing simple...