Amateurs attack technology. Professional hackers target people.
Ensure security standards drive the most business benefit.
It takes years to build a reputation… and a matter of seconds to destroy it.
The ability to change effectively and operate efficiently.
Don’t let your IT initiatives fail. Reveal and profit from the value of IT.
Increase efficiency and prepare for long term competitiveness.
A healthy relationship requires hard work and commitment.
Expert cyber incident identification, containment and recovery.
Information Risk Management Plc (IRM) is delighted to announce that we have partnered with Article 10, a highly respected marketing communications agency that specialises in security awareness and education campaigns.
A vulnerability (CVE-2014-6271) has been identified which enables remote access to be granted to any device which uses a bash shell. Many will assume that this vulnerability will only affect local device interaction on a system. However, bash is used across widespread applications, including Apache, and all devices which run a Linux kernel, and as such, is highly likely to impact a significant portion of the corporate environment.