Deception technology is a simple but effective method of active defence which builds upon the concept of honeypots, a sacrificial system intended to attract cyberattacks.
Topics: Deception Technology, Cyber Detection Technology, What is a honeypot, honey potting
A data breach could take over 100 days to be spotted. An additional 60 days may be needed to recover from it. However, you can recover from a breach within 30 days with a recovery plan, saving you resources. Your recovery team’s swift reaction to any signs of a data breach will help you recover as soon as possible.
Topics: Penetration Testing, cybersecurity, Data Breach, network security, data privacy security
As the use of technology in the workplace continues to grow, so does the importance of cybersecurity. Large corporations are frequently targeted by hackers, but smaller enterprises may be even more appealing targets as they may not be able to devote as much attention to setting up cybersecurity protocols and are thus simpler to breach. Despite the increasing awareness of cybersecurity threats, many employees still do not take the necessary precautions to protect their data and devices.
Topics: cybersecurity training courses, Cybersecurity training
PCI DSS 4.0 Migration for Merchants and Service Providers | LRQA Nettitude
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) was released at the end of March 2022. At the time of writing, we now have less than one year until the previous version, 3.2.1, is retired and can no longer be used for new assessments.
Topics: PCI Compliance, PCI DSS 4.0, PCI DSS, payment card industry security standards, PCI DSS Compliance
Challenges of Meeting ASV Scanning Requirements in PCI 4.0 | LRQA Nettitude
If you've ever taken a credit card as payment for anything, then you've probably heard of the Payment Card Industry Data Security Standard (PCI DSS). This defines a set of requirements for merchants and service providers to protect their customers' payment card data. The importance of PCI DSS lies in the fact that it helps to protect sensitive data which could have huge ramifications should it fall into the wrong hands. This includes information such as credit card numbers, names, addresses, and other personally identifiable information.
Topics: PCI Compliance, PCI DSS 4.0, PCI DSS, payment card industry security standards, Vulnerability Scanning, Approved Scanning Vendor, asv scanning, PCI DSS Compliance
The Dangers of Social Engineering Attacks in Cybersecurity | Nettitude
A social engineering attack refers to any type of attack where deception, manipulation or coercion is used to elicit information or access from a person for their own purposes. Social engineering refers to any technique used by a threat actor that focuses on people and process, rather than on technology. The most common form of social engineering attack is a phishing email that tricks victims into giving up personal information such as passwords and credit card details. Phishing often masquerades as an official corporate email from an organisation's CEO or another trusted person within the company.
Topics: Penetration Testing, Social Engineering, Social Engineering Attack
Security Excellence Awards 2023 Rising Star Interviews | Nettitude
The Security Excellence Awards 2023, hosted by Computing, are a prestigious event that recognises outstanding achievements in cybersecurity. These awards celebrate individuals and companies that have demonstrated excellence, including the Rising Star category, which highlights emerging talents in the industry. This category shines a spotlight on individuals who have shown exceptional skills, dedication, and innovation in their roles and have the potential to become future leaders in the cybersecurity field.
We are delighted that among the nominees for the Rising Star category are two Nettitude colleagues Matthew Saunders and Chloe Sharp. Learn more about Matthew and Chloe below.
Topics: cybersecurity
What are the Different Types of Cybersecurity Testing? | Nettitude
When it comes to cybersecurity, one of the most important things you can do is test your system for vulnerabilities. Cybersecurity testing ensures you have all the necessary security measures in place and that they are functioning correctly. There are many ways to test the security of a system. Some are more thorough than others, and some take longer to complete.
Topics: Penetration Testing, risk assessment, cybersecurity, Vulnerability Scanning, Vulnerability Assessment
Despite the numerous messaging apps available, email remains the most used method of formal communication. This is because email is still associated with professionalism. However, as emails are preferred among businesses, this also makes them an ideal target for cybercriminals.
Most data breaches occur for an economic reason—the attacker hopes to profit from the information they gain access to. Emails contain a lot of personal information already and can also be used to access other vital systems. This makes them an ideal entry point for hackers with varying motives.
Topics: cybersecurity, phishing, Email Security, zero-day
As the world becomes increasingly interconnected, businesses must take steps to secure their data and protect their application programming interface (API). API security is vital for two reasons. First, APIs provide access to sensitive data, making them a prime target for attacks. Second, APIs can be used to launch attacks on other systems, making them a critical part of any security strategy. To protect your business, it is essential to implement robust API security measures.
Topics: Penetration Testing, Website Penetration Testing, Web Application Penetration Testing Tools, Web App Penetration Testing