Nettitude Blog

Nettitude

Recent Posts

What makes a strong password?

Posted by Nettitude on Dec 7, 2018 12:18:50 PM

Even social media giant Facebook has been ordered to step up data protection as 29 million of its user’s passwords were exposed in 2018. Creating a strong and secure password is a critical step in protecting confidential data and networks. Your infrastructure can come under attack from cyber criminals at any time and passwords can provide the key to that kingdom for hackers.

Read More

What Is Ransomware? Definite Guide

Posted by Nettitude on Nov 27, 2018 2:24:24 PM

The 2018 Verizon Data Breach Investigations Report (DBIRdeclares ransomware “the most prevalent variety of malware”.

Read More

Cyber Security Threats

Posted by Nettitude on Nov 1, 2018 4:11:00 PM

With the number of cyber-attacks growing in prominence every day from the reputational ruin of organisations overnight to the manipulation of election results, the threat cybercrime presents to us all should not be undervalued.

Read More

How To Build A Strategic Cyber Security Plan

Posted by Nettitude on Oct 18, 2018 1:22:23 PM

What is a cybersecurity plan?

A cyber security plan is an organisation’s written guide to follow and improve its overall risk management and defences against the on-going threat of cybercrime - and some might say the most significant threat they face. 

Read More

Vulnerability Scanning Vs. Penetration Testing

Posted by Nettitude on Oct 15, 2018 1:59:39 PM

The key difference between vulnerability scanning and penetration testing concerns the focus of the security project.

Read More

The Importance of Cyber Security

Posted by Nettitude on Oct 10, 2018 2:30:09 PM

In today’s modern connected world cyber security matters and is vital for protecting our crucial infrastructure. The threat of cyber-attacks is now a worldwide concern, as high-profile breaches create fear that cybercrime could endanger the global economy.

Read More

Cyber Security vs. Information Security: Understanding The Difference

Posted by Nettitude on Oct 10, 2018 1:36:26 PM

When combined cyber security and information security help provide organisations with a modern day approach to building a strong security posture. The two security practices also help develop the organisation’s security resilience.

Read More

The Fundamentals of Web Application Security

Posted by Nettitude on Sep 19, 2018 3:36:24 PM

Weak security is a major flaw of most web applications. Leaving the business environment highly susceptible to cybersecurity attacks every day. Insecure applications provide a gateway for criminals to pivot directly into an organisation’s corporate environment. So why are the organisations leaving themselves vulnerable through poor web security practice? Moreover, how can companies strengthen their cybersecurity to develop programs that deliver the best web application technology and not compromise the app's security?

Read More

How to effectively conduct a cyber security audit

Posted by Nettitude on Sep 19, 2018 3:13:47 PM

A cyber security audit conducted by Nettitude will provide your organisation with a high-level appraisal of your cyber security posture. You will receive a personalised report containing actionable advice and a clear set of guidelines to remediate any security threat or weaknesses identified. The audit will focus on your people, process, technology and policy.  

Read More

Current Cybersecurity Threats And Emerging Trends

Posted by Nettitude on Sep 19, 2018 1:20:30 PM

In today's cyber-obsessed world, you only have to scroll the web pages of your favourite online news agency to see that with a new day comes new reports of cyber attacks. From ransomware to phishing scams and state-sponsored attacks, it is clear that cybercrime is an increasing threat for all businesses and online users.

Read More

Topics: Cyber Security

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts