Nettitude Blog

Ransomware - How to avoid becoming a victim

Posted by Amy Tuck on Apr 24, 2018 11:44:22 AM

The 2018 RSA Conference took place in San Francisco last week and Nettitude's Senior Consultant, Ben Rothke traveled there to deliver a presentation on ransomware. He discussed both how not to become a victim, and what enterprises should do if they do become one. Here is a recap of what Ben discussed.

Read More

Future proofing the development of cryptocurrency

Posted by Nettitude on Apr 19, 2018 2:16:12 PM

The blockchain, although developed for and most commonly known as a financial instrument within cryptocurrencies, is gaining an increasing foothold as a useful technology in many industries. It is being applied to many applications and held up to solve some interesting problem areas.

Read More

PCI DSS Service Providers beware – are you ready for 1st May 2018?

Posted by Peter O'Sullivan on Apr 9, 2018 3:47:59 PM

There’s a critical date approaching in the PCI DSS calendar. Some of you may be wondering “what date could possibly be that important?”

Read More

What to expect at the RSA Conference

Posted by Ben Rothke on Apr 4, 2018 11:02:35 AM

Find out what Nettitude will be doing at the RSA Conference from consultant, Ben Rothke. 

Read More

How to manage a cyber attack

Posted by Amy Tuck on Mar 29, 2018 2:49:12 PM

Each year we look back at the statistics and how concerning it is that how rapidly the number of cyber attacks is increasing. 2017 saw the most attacks yet, and nobody seemed safe. From the WannaCry ransomware that brought the NHS to a grounding halt, to the Equifax hack that saw an estimated 145 million customer details compromised. 

Read More

6 steps to creating a safe password

Posted by Amy Tuck on Mar 21, 2018 1:43:43 PM

Creating a strong and secure password is an important part of protecting your confidential data and networks. However these have come under attack from cyber criminals trying to access your infrastructure. Many hackers will get hold of your passwords through social engineering activities, by tricking you into entering your login credentials to a false site or software. Another common way for criminals to get your passwords is through brute force, where they use tools to automatically enter the most common passwords that we are all guilty of using, with the hope that one of them works.  

Read More

Topics: Cyber Security

Building a secure future – Cyber security service provider Nettitude joins the Lloyd’s Register group

Posted by Nettitude on Mar 16, 2018 2:52:23 PM

London, 16th March 2018 -- Lloyd’s Register (LR), one of the world’s leading providers of professional services for engineering and technology, today announces the acquisition of Nettitude, a market-leading provider of cyber security services with some of the most sophisticated technical capabilities in the industry.

Read More

Perception Report; The threat landscape

Posted by Amy Tuck on Mar 15, 2018 11:46:54 AM

Understanding the threats that are evolving in your environment is an important part of a cyber security strategy. Unraveling the methods and tools that have been used in recent cyber attacks will help your organization to better understand and protect against a possible threat.

Read More

Are you ready for GDPR? 

Posted by Amy Tuck on Mar 12, 2018 3:52:38 PM

The General Data Protection Regulation (GDPR) comes into force at the end of May. With it only being a number of weeks away we thought we'd ensure that you are ready for all the changes coming into place. Here is what you can expect. 

Read More

The dangers of public Wi-Fi

Posted by Amy Tuck on Mar 9, 2018 11:33:44 AM

We've all been there, connecting to a public Wi-Fi without giving it a second thought. But did you know that there are more dangers to public Wi-Fi than you might realize? Take a look at the ways you could be opening yourself up to a cyber-attack, all while you sit in your favorite coffee shop. 

Read More

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts