Nettitude Blog

Network Design & Configuration – 6 Key Factors | Nettitude

Posted by Nettitude on Feb 18, 2020 4:45:32 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude 

Effective network design is crucial for the smooth running of every business. As the heart of your business activity, your network is relied upon day-in, day-out by your staff to keep business flowing, and customers returning. As most of us have experienced before, when the network goes down, chaos usually follows. When this happens, it can often be a mammoth task to get everything back up and running and the time lost is irreplaceable. However, by following best practice for network design and configuration from the beginning, you could prevent many issues before they arise.

Below, we’ll explain why establishing a well-designed and configured network is important, as well as detailing the six factors that are essential to the smooth running of your network…

 

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area

Cybersecurity and the Cloud Series – 4 key considerations to take when adopting cloud technology | Nettitude

Posted by Nettitude on Feb 12, 2020 4:48:59 PM

By Nettitude 

In the nearly fifteen years since Amazon launched its initial cloud computing offering, the ways we develop, deploy and manage applications have been changing at pace. More businesses are finding that the transition away from traditional data centre technology is offering advantages such as increased flexibility, more rapid time-to-market, and allowing them to scale to meet customer demand.

 Of course, many of the security considerations of using cloud infrastructure mirror those for more traditional infrastructure, and organisations should draw on existing expertise to manage them. However, different ways of working in the cloud mean that there are new aspects to consider to ensure that you are secured against the latest threats. It’s also worth remembering that these new ways of working can also offer an opportunity to adopt more secure ways of working at a lower cost – but only if deployed effectively.

Below, we’ll take a look at the main advantages of adopting cloud technology, as well as four key considerations your business should take.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Modern Ships – 6 Common Security Issues | Nettitude

Posted by Nettitude on Jan 30, 2020 9:55:03 AM

By Graham Sutherland, Senior Researcher & Consultant at Nettitude

Modern ships utilise networked technologies in order to provide faster, more accurate, and more convenient operations of the vessel. This connectivity unfortunately brings with it new threats to the security of the vessel, its crew, and its cargo, while additionally bringing unique challenges in terms of systems maintenance.

Whilst the benefits of these technologies bring huge value to day to day operations, there are certain precautions which should be taken to offset any risks associated with integrating such technologies. Below are some of the most common security issues faced on today’s ships that you should be aware of.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation, Marine and Offshore

Visit Nettitude at PCI London 2020 | Park Plaza Victoria

Posted by Nettitude on Jan 16, 2020 4:17:26 PM

By Nettitude

We are pleased to announce, Nettitude will be exhibiting at the 20th PCI London event this month at Park Plaza, Victoria. The annual PCI events are well known for delivering the latest industry insights, updates and keynote talks on all things PCI-DSS, and are not to be missed by anyone working within the industry.

 

Read More

Topics: Cyber Security, Nettitude, Events, News, Security Blog, Security Testing, Cyber Security Blog

NotPetya Ransomware Attack on Maersk – Key Learnings | Nettitude

Posted by Nettitude on Jan 16, 2020 3:22:59 PM

The shipping sector has traditionally stood apart from the developments in cybersecurity over the past decade. With the majority of critical functions and assets physically isolated by miles of ocean, the need to secure these resources against cyber threats has seemed similarly remote.

However, in recent years, this hands-off approach to cybersecurity and assurance has become riskier and ultimately, costlier. In the modern cyber threat landscape, less capable adversaries such as hacktivists and teenage virus writers take a back seat to organised criminals and even nation state-sponsored threat actors. The cyber-crime economy is now mature, well-established, and well-developed.

Below we will take a look at the key learnings for ship owners and operators which can be taken from previous research and attacks, and most notably the NotPetya attack in 2017 which caused major implications for global shipping giant Maersk.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation, Marine and Offshore

Remote Access Solutions | Part 1  - An overview of remote solutions at sea | Nettitude

Posted by Nettitude on Jan 10, 2020 11:13:20 AM

By Graham Sutherland, Senior Vulnerability Researcher

The traditional online attack surface for ships is changing. Gone are the years where vessels were put to sea for months at a time with little or no contact made with the shore, with letters awaiting them at their next arrival port and unpredictable journey times and locations.

Even with the advent of satellite phones, GPS tracking and computer-based navigation, a typical ship will still have a much more limited online presence compared to shore-based organisations. However, this is changing rapidly. As the availability and reliability of internet connections aboard ships improves, it is natural that organisations will seek to leverage this connectivity for the purposes of remote monitoring and diagnostics.

Below, we take a look at the new and enhanced risks posed by remote access communication on board ships and how we can approach a safer way of operating to protect the ship, its assets and the people on board.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation, Marine and Offshore

Cyber Risks in Communication Systems Series:  Integration risks to communications technology for the M+O sector| Nettitude

Posted by Nettitude on Jan 8, 2020 2:43:43 PM

The explosive growth in communications services over the last two decades has dramatically changed the way that businesses operate in all sectors, improving efficiency and providing new opportunities. In the maritime sector, we can see this from the original adoption of VHF a hundred years ago for ship communication through to more recent safety technologies such as AIS and satellite communication. However, the limited bandwidth and high cost of these technologies has historically limited the sector’s ability to leverage them in many of the ways seen in other industries.

Notably, when adding new technologies or capabilities into existing systems, it’s important to consider any additional risk that may be presented; this can be both from vulnerabilities in the underlying technologies themselves, or from the way in which they can interact with or expose other capabilities. Where risks are identified, mitigations should be put in place to reduce them to an acceptable level. Below we explore some of the ways in which this can be done, and some examples for widely used maritime technologies.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation, Marine and Offshore

Q&A with our Network Solutions Account Manager | Nettitude

Posted by Nettitude on Dec 20, 2019 4:02:00 PM

We are pleased to announce the addition of Mike Hubbard, our new Security and Network Solutions Account Manager, within the Security and Network Solutions team. This new team delivers network consultancy, enterprise network solutions and network security solutions. Throughout the forthcoming months, Mike will be working closely with our clients to assess the effectiveness of their current environments and advise on any appropriate action to ensure their business infrastructure and network solutions are as safe and effective as possible. Below is a further insight into how Mike will be working within this new team.

 

Read More

Topics: Cyber Security, Security Blog, Cyber Security Blog

Implementing the IMO Cybersecurity Requirements for Ships | Nettitude

Posted by Nettitude on Dec 19, 2019 9:13:58 PM

By Duncan Duffy, Head of Electrotechnical Systems, Lloyd’s Register Marine & Offshore

Increasingly interconnected computer-based systems on ships open the potential for attacks to affect human safety, the safety of the ship and to threaten the marine environment. Attackers may target any combination of people and technology to achieve their aim. To safeguard shipping from current and emerging threats, a range of measures can be adopted.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

The 5 Steps to an Effective Cybersecurity Strategy | Nettitude

Posted by Nettitude on Dec 13, 2019 11:31:13 AM

By Ben Densham, CTO at Nettitude

By 2021, Forbes estimates that there will be $6 trillion in damages caused by cyberattacks, a figure that exceeds the cost of all natural disasters in an entire year. However, cyberattacks and the impact they can have on organisations are now becoming much better understood, and more businesses are putting protocols and cybersecurity strategies in place to become proactive rather than reactive to cyber threats.

Creating a cybersecurity strategy involves working out what ‘good’ looks like for your business in terms of maintaining digital security, keeping cyber threats at bay and having a plan of action in place for the possibility of a breach. Your cybersecurity strategy should be a clear vision that’s well articulated, has board level engagement and is relevant to your industry. Whilst many businesses have a cybersecurity policy, this is no longer enough. It’s crucial to have a full strategy in place which instigates cultural change within your business ecosystem, and isn’t just reactive to threats but proactively ensures your business is doing everything possible to protect itself from cyberattacks.

Here are 5 steps to consider when creating your effective cybersecurity strategy: 

.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of Lloyd’s Register, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts