Cyberwarfare & potential cyber-collateral damage: what you need to know By Hannah Pisani - April 8th, 2022 Posted in Information Security, News & Resources cyberwarfare, information security Cyberwarfare or cyber terrorism refers to a form of security incident in which a nation-state actor or group attempts to damage another n...
ISO 27001 or Cyber Essentials – which Information Security Standard is suitable for you? By Hannah Pisani - January 18th, 2022 Posted in Information Security, ISO 27001 cyber essentials, cyber essentials plus, cyber security, information security, information security standard, iso certification, iso27001 Achieving certification to a recognised and accredited standard is a credible way for organisations to give their customers, partners and...
What is a firewall ruleset and configuration review? By Alex Harper - January 5th, 2022 Posted in Information Security cyber security, cyber security firewall, firewall, information security, penetration test, penetration testing A firewall ruleset and configuration review is a detailed assessment of your firewall ruleset and configurations. The test is typically c...
UK government launches new National Cyber Strategy By Hannah Pisani - December 16th, 2021 Posted in Information Security cyber security, cyber stratgey, information security, UK government On the 15th of December, the Government in the United Kingdom (“UK) published a new National Cyber Strategy, outlining how the UK w...
What are cloud misconfigurations? By Marcus Chambers - December 14th, 2021 Posted in Information Security cloud, cloud storage, cyber security, information security, misconfiguration A cloud misconfiguration is an incorrect configuration of a cloud system that may lead to vulnerabilities. These misconfigurations typica...
Addressing the information security risks of digital supply chains By Marcus Chambers - November 30th, 2021 Posted in Information Security business security, cyber risks, cyber security, digital supply chain, information security, supply chains, third party suppliers Today’s supply chains are often opaque and complex, compromising mass ecosystems of vendors, suppliers and partners connected by servers,...
Vulnerability scanning 101: Best Practices for Vulnerability Scanning By Alex Harper - November 10th, 2021 Posted in Information Security cyber attacks, cyber security, information security, patches, scanning, vulnerabilities, vulnerability scan Companies today face the ongoing task of securing complex information technology (“IT”) environments, while achieving their business obje...
Internal vs external penetration testing By Alex Harper - September 3rd, 2021 Posted in Penetration Testing cyber security, information security, pen test, pen testing, penetration testing A penetration test is a point in time assessment of your company’s security posture. In the battle against cyber attackers, penetration t...