In this article, we present the Internet of Things (IoT) and the current security status of IoT devices. The reader will also gain a practical guide towards IoT security in the workplace and an account of the latest information to help futureproof organisations against cyber attacks.
Even social media giant Facebook has been ordered to step up data protection as 29 million of its user’s passwords were exposed in 2018. Creating a strong and secure password is a critical step in protecting confidential data and networks. Your infrastructure can come under attack from cyber criminals at any time and passwords can provide the key to that kingdom for hackers.
The 2018 Verizon Data Breach Investigations Report (DBIR) declares ransomware “the most prevalent variety of malware”.
With the number of cyber-attacks growing in prominence every day from the reputational ruin of organisations overnight to the manipulation of election results, the threat cybercrime presents to us all should not be undervalued.
What is a cybersecurity plan?
A cyber security plan is an organisation’s written guide to follow and improve its overall risk management and defences against the on-going threat of cybercrime - and some might say the most significant threat they face.
Earlier this month, Nettitude attended the DerbyCon 2018 conference and competed in the 48 hour Capture the Flag (CTF) competition under our usual team name of “Spicy Weasel." We are extremely pleased to announce that, for the second year in a row, Nettitude's team took first place out of 175 teams and netted another black badge.
The key difference between vulnerability scanning and penetration testing concerns the focus of the security project.
In today’s modern connected world cyber security matters and is vital for protecting our crucial infrastructure. The threat of cyber-attacks is now a worldwide concern, as high-profile breaches create fear that cybercrime could endanger the global economy.
When combined cyber security and information security help provide organisations with a modern day approach to building a strong security posture. The two security practices also help develop the organisation’s security resilience.
Weak security is a major flaw of most web applications. Leaving the business environment highly susceptible to cybersecurity attacks every day. Insecure applications provide a gateway for criminals to pivot directly into an organisation’s corporate environment. So why are the organisations leaving themselves vulnerable through poor web security practice? Moreover, how can companies strengthen their cybersecurity to develop programs that deliver the best web application technology and not compromise the app's security?