We frequently get contacted by organizations after they have experienced a data breach. All too frequently the incident comes as a complete shock, and the reason that they find out it because they are contacted by a 3rd party. We have compiled our top 5 reasons why organizations don’t detect a cyber breach.
Red Teaming is flavour of the month within the cyber security industry. But what does it mean? And should I really be considering it for my organisation/business?
Much has been said in the last few years about the potential for blockchain-based technology to radically change the way in which financial and commercial transactions are executed. The way that it would achieve this is by disintermediation: removing the need for a trusted intermediary to facilitate each transaction, and allowing business to be conducted in a peer-to-peer manner.
How to monitor your external devices and improve your alerts (pt.1)
Being able to detect new malware infections or security breaches on a network or on a computer system without known signatures is always a challenge. We explore a simple and efficient solution to monitor external facing assets, such as servers, and we discuss the data that was collected during the experimental period.
Topics: Cyber Security Blog
Nettitude are sent many suspected phishing emails for investigation. This week we received one that is a great example of how to analyse phishing emails in a bit more depth.
Topics: Security Blog
Every day, over 3 million records are compromised from companies around the world. The fact is that cyber threats are no longer a question of IF, but WHEN, a breach will occur. It is vital for your company to have a cyber security plan in place so that you are ready to act if your organisation experiences a data breach.
Topics: Security Blog, Uncategorized
Topics: Security Blog, Uncategorized