Data protection by design By Evalian® - November 1st, 2023 Posted in Data Protection, Information Security cyber security, data, information security, penetration testing, security, software, software design What is data protection by design? Article 25 of General Data Protection Regulation (GDPR) mandates ‘data protection by design and by de...
Cloud security misconfigurations & how to prevent them By Marcus Chambers - May 30th, 2023 Posted in Information Security cloud, cloud storage, cyber security, information security, misconfiguration What are cloud misconfigurations? A cloud misconfiguration is an incorrect configuration of a cloud system that may lead to vulnerabiliti...
How to choose a penetration testing partner By Alex Harper - April 1st, 2023 Posted in Penetration Testing cyber attacks, cyber crime, cyber security, information security, pen test, pen testing, penetration test, penetration testing The importance of a good penetration testing partner A good third-party penetration testing partner will guide you through the pen test p...
Internal vs external infrastructure penetration testing By Alex Harper - March 3rd, 2023 Posted in Penetration Testing cyber security, information security, pen test, pen testing, penetration testing What is the difference between internal infrastructure pen testing and external pen testing? An internal infrastructure penetration test ...
Just how big a threat is online crime? 2023 By Philip Harris - January 30th, 2023 Posted in Information Security cyber attack, cyber crime, cyber criminals, data security, information security, online crime Online crime in 2023 You’d be hard pushed to have to search past page one of Google to find a cyber-related headline – whether repo...
What is a firewall ruleset and configuration review? By Alex Harper - January 5th, 2023 Posted in Information Security cyber security, cyber security firewall, firewall, information security, penetration test, penetration testing A firewall ruleset and configuration review is a detailed assessment of your firewall ruleset and configurations. The test is typically c...
Cyberwarfare & potential cyber-collateral damage: what you need to know By Marcus Chambers - April 8th, 2022 Posted in Information Security, News & Resources cyberwarfare, information security Cyberwarfare or cyber terrorism refers to a form of security incident in which a nation-state actor or group attempts to damage another n...
ISO 27001 or Cyber Essentials? By Evalian® - January 18th, 2022 Posted in Information Security, ISO 27001 cyber essentials, cyber essentials plus, cyber security, information security, information security standard, iso certification, iso27001 Achieving certification to a recognised and accredited standard is a credible way for organisations to give their customers, partners and...