Are password strength meters up to the task?
Password strength meters are designed to help users create strong secure passwords, but many are easily fooled and leave people with a false impression of how strong their passwords are. When users sign up for a new site, they are often greeted with a password strength bar. These are supposed to measure the strength of the password from the weakest to the strongest., but what are these meters a
Opera cyber attack – what happened and should we be worried?
Opera Software, which develops browsers for PCs and mobile platforms, suffered a security breach at the end of August. With Opera being the fifth most popular browser, it raises concerns about the data of a huge number of people. What happened? The security issues affected Opera’s sync service, which synchronises browsing data across the different devices that have Opera installed. Althoug
What salary should people expect for IT security jobs?
Most IT security jobs are reasonably well paid, but like most jobs, salaries vary according to experience, seniority and level of responsibilities. The average UK salary is currently £27,531. IT security jobs are generally above this level and have risen by over 10% year on year since 2014. The figures The Acumin Security Salary Index 2016 can be downloaded free of charge, and takes a look
How are cyber security jobs developing in Europe?
Since the European Commission has created a cyber security strategy, this is having a strong influence on the development of cyber security jobs in Europe. Cooperation One of the main objectives of the European Commission is increased cooperation. This means that cyber security personnel will be expected to exchange information with their colleagues in other European countries. To help th
Should we offer cyber security jobs to ex-cyber criminals?
According to the cyber security company Radware a fifth of UK businesses have given cyber security jobs to one-time hackers, highlighting a moral dilemma that businesses face. Radware also stated that 60% of businesses had been the victim of a cybercrime over the last 12 months. Companies could find themselves paying money to the very criminals that have in the past attacked them. Is this moral
What skills from IT security jobs can be transferred to other sectors?
The techniques people learn with a view to picking up IT security jobs can often be used to excellent effect outside of their desired industry. Let’s take a look at how: The job market has changed Many years ago, it was common for a person to leave school, get a job and then stay with the same company for the rest of their working life before retiring at the age of 60 (for women) or 65 (fo
How is gamification shaping cyber security?
Gamification, the process of applying gaming elements to other activities, is rapidly becoming a tool to assist cyber security. There are four main principles of gamification: • Create a goal • Create the rules for attaining that goal • Set up feedback systems • Make playing the game voluntary Sports such as football and golf are based on these principles. Online role play game
Brexit – how might it affect cyber security?
The results of the recent referendum mean that within two or more years, the United Kingdom will leave the European Union. The exit will affect many areas of British life, including the economy, immigration and trade with Europe, but will it have a significant effect on cyber security? At this early stage before Britain has negotiated a leaving strategy, there are many uncertainties about exact
How will IT security jobs change in the next decade?
Technology is developing at a fast pace, and IT security jobs will need to adapt to these changes. Microsoft, in its Cyberspace 2025 report, has made predictions on how communications technology will change in the next 10 years and how security experts will be needed to protect technology. If all or most of their predictions are accurate, then this will affect the nature of IT security jobs. Mi
What risks are companies taking by not making cyber security jobs available?
We live in a networked world. Banking, online shopping, emails and streaming services are just a few of the everyday activities that involve networks. What’s more, all these networks require cyber security experts to protect them. Potentially all networks are vulnerable to cyber-attacks, which makes it vital that any company that manages a network needs to protect it by employing expert cyber