Welcome to our March Newsletter!

Welcome to our March Newsletter!

In this month's edition:

  • We’ll cover the latest cyber security trends and how you can secure your network with a specific focus on the healthcare industry.
  • We continue our focus on pen testing and how a simple diagnostic can become an ongoing part of your proactive cyber strategy.
  • We’re also excited to announce a new partnership with AppViewX, the latest innovative solution in certificate expiry.
  • Finally, a focus on sustainable energy and the future of renewable critical infrastructure – FullProxy’s partnership with the Forth and Tay OffShore Cluster.

CYBER NEWS - LATEST

Our curated roundup of top news stories in the cyber security world this month, including a cyber incident that has disrupted another UK University, an attack on an American prescription processor and the UK Government’s new approach in tackling overseas and domestic security threats:

University confirms 'cyber security incident'

The University of Wolverhampton has confirmed it was hit by a "cyber security incident" earlier this week which led to its IT systems going down. Thousands of university staff and students were asked to work from home after IT issues began on Tuesday across all of the university's campuses. It came as the University of Cambridge and the University of Manchester suffered cyber attacks on the same day.

According to Evalian, 92% out of 37 higher education institutions in the UK reported cyber attacks in 2022.

Read our latest case study on how we helped a University implement F5 BIG-IP Access Policy Manager (APM) and achieve better remote access for staff and students, overcoming the limitations of the legacy VPN product here.

Change Healthcare Attack raises cash concerns for Pharmacies

A cyber attack on prescription processor Change Healthcare last week continues to cause problems for pharmacies and clinics across the world, as systems remain down almost one week after the hack was detected.

Change Healthcare has since shut down more than 100 services while it works to recover. The American Hospital Association recommended that companies using these Optum services disconnect from them while problems are resolved. Affected systems include those related to claims management, payment services, appointment scheduling, billing, and data exchanges.

·   UK to take new approach in tackling overseas and domestic security threats

The Government will take a new integrated approach that combines how it tackles overseas and domestic security threats.

The new ISF (Integrated Security Fund) will build on the success of the CSSF ( Conflict, Stability & Security Fund) to combine our overseas and domestic security response to tackle transnational challenges threatening the UK and its partners. This integrated approach will help to address key challenges such as causes of instability and conflict, serious and organised crime, smuggling, illicit finance, cyber attacks and illegal migration.

6 STEPS TO SAFEGUARD PATIENT DATA

By adopting a multi-layered approach to cyber security and continuously adapting to emerging threats, healthcare organisations can significantly reduce the risk of cyber attacks and better protect patient data and critical infrastructure.

Here's Donald's top recommendations:

  1. Implement strong access controls:

Enforce strict access controls to sensitive data and systems, using techniques such as multi-factor authentication (MFA) and role-based access control (RBAC).

2. Regular security training and awareness

Provide ongoing cyber security training to all staff members to raise awareness about common threats such as phishing attacks and social engineering tactics.

3. Keep systems updated and patched

Ensure that all software, operating systems, and applications are regularly updated with the latest security patches to address known vulnerabilities.

4. Network segmentation

Segment networks to restrict access to sensitive systems and data, reducing the potential impact of a breach and limiting lateral movement by attackers.

5. Encrypt data

Encrypt sensitive data both in transit and at rest to protect it from unauthorized access, especially if stored on mobile devices or in the cloud.

6. Monitor and detect anomalies

Deploy security monitoring tools to detect unusual activity or anomalies on the network, allowing for early detection and response to potential threats.

Read how we helped protect an NHS trust against cyber attacks here

FULLPROXY JOINS FORTH & TAY OFFSHORE CLUSTER TO ENHANCE CYBER SECURITY CAPABILITIES FOR THE RENEWABLE OFFSHORE WIND SECTOR

We are thrilled to officially be a member of the Forth & Tay Offshore Cluster! What does this mean? Well, we're diving headfirst into an exciting initiative that's all about teamwork, innovation, and supporting renewable energy in Scotland. At FullProxy, we're proud to be backing an organisation that's working towards a more sustainable future, plus helping suppliers in the cluster create a secure environment for their customers.

The Forth & Tay Offshore Cluster, centered in the hub of the east coast of Scotland, is dedicated to promoting the capabilities of companies and organisations within the offshore wind energy sector. By facilitating collaboration and offering support in skills development, it aims to establish the region as a hub for a thriving, wind energy companies who will be a fighting force in combatting the climate crisis and providing clean energy to Scotland. Find out more here.

ALL IN ONE CERTFICATE AUTOMATION: INTRODUCING APPVIEWX CERT+

We're excited to announce that we have partnered with APPVIEWX cert+, revolutionising your certificate lifecycle management.

Ready to bid farewell to those tedious - or sometimes panicked - manual certificate updates? Say hello to the future of efficiency and automation with Cert+. Here's what you'll get:

  • No more manual errors: automate those pesky certificate processes and eliminate mistakes.
  • Time and resource savings: Cert+ does the heavy lifting for you, freeing up your team's time.
  • Downtime risk reduction: keep your operations running smoothly by avoiding costly downtime with streamlined certificate management.
  • Compliance made easy: stay on top of compliance effortlessly with comprehensive reporting and audit trails.
  • All-in-one platform: access everything you need from one easy to use platform.
  • Elevate your security: boost your security game and rest easy knowing your certificates are in good hands.

Ready to take your security to the next level? Arrange a chat with our Account Manager here.

AFFORDABLE PEN TESTING WITH FULLPROXY

This month we continue our focus on the importance of pen testing and its potential to become a proactive vulnerability detection tool in your armoury. Here's how we can help:

  • Easy to buy packages. Advanced pen tests at affordable prices available on a one-off, repeat or continuous basis. Our packages can also be adapted to suit your needs, and if you need us to we'll help ensure seamless execution – with no unnecessary delays or hassle. Find out more information here.
  • Instant notifications. Keep up to date with real-time notifications at the start and end of your Pen Test. This not only keeps you informed but also facilitates co-ordination with any alerts triggered during the assessment.
  • Insightful reports. Your pen test should do more than just list the vulnerabilities it finds. FullProxy pen test reports offer actionable insights, giving you a comprehensive understanding of how these risks impact your organisation, benchmarking against industry standards, and tracking your progress since your last pen test.
  • Streamlined detection and response. By meticulously tracking all activities, we can assist you in optimising your defences if you wish, reducing the time required to identify and address future incidents. For more detailed info check out our spec sheet here.
  • Cost effectiveness. Exceptional service needn't come at a premium. We believe in the value of pen testing as part of a comprehensive cyber strategy, so we make our pricing affordable and combine it with actionable reporting that helps you get the most from the technology. Find out more here.


Stay cyber safe!

Abbie & The FullProxy Team


To view or add a comment, sign in

More articles by FullProxy

Insights from the community

Others also viewed

Explore topics