LRQA Nettitude Blog

How to Recover From a Data Breach: The Steps To Take

Posted by LRQA Nettitude on Jun 30, 2023

A data breach could take over 100 days to be spotted. An additional 60 days may be needed to recover from it. However, you can recover from a breach within 30 days with a recovery plan, saving you resources. Your recovery team’s swift reaction to any signs of a data breach will help you recover as soon as possible.

Read More

Topics: Penetration Testing, cybersecurity, Data Breach, network security, data privacy security

7 Cybersecurity Best Practices for Employees

Posted by LRQA Nettitude on Jun 30, 2023

As the use of technology in the workplace continues to grow, so does the importance of cybersecurity. Large corporations are frequently targeted by hackers, but smaller enterprises may be even more appealing targets as they may not be able to devote as much attention to setting up cybersecurity protocols and are thus simpler to breach. Despite the increasing awareness of cybersecurity threats, many employees still do not take the necessary precautions to protect their data and devices.

Read More

Topics: cybersecurity training courses, Cybersecurity training

PCI DSS 4.0 Migration for Merchants and Service Providers | LRQA Nettitude

Posted by LRQA Nettitude on May 31, 2023

 

Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) was released at the end of March 2022. At the time of writing, we now have less than one year until the previous version, 3.2.1, is retired and can no longer be used for new assessments.

Read More

Topics: PCI Compliance, PCI DSS 4.0, PCI DSS, payment card industry security standards, PCI DSS Compliance

Challenges of Meeting ASV Scanning Requirements in PCI 4.0 | LRQA Nettitude

Posted by Nettitude on May 30, 2023

 

If you've ever taken a credit card as payment for anything, then you've probably heard of the Payment Card Industry Data Security Standard (PCI DSS). This defines a set of requirements for merchants and service providers to protect their customers' payment card data. The importance of PCI DSS lies in the fact that it helps to protect sensitive data which could have huge ramifications should it fall into the wrong hands. This includes information such as credit card numbers, names, addresses, and other personally identifiable information.

Read More

Topics: PCI Compliance, PCI DSS 4.0, PCI DSS, payment card industry security standards, Vulnerability Scanning, Approved Scanning Vendor, asv scanning, PCI DSS Compliance

The Dangers of Social Engineering Attacks in Cybersecurity | Nettitude

Posted by Nettitude on Apr 29, 2023

 

A social engineering attack refers to any type of attack where deception, manipulation or coercion is used to elicit information or access from a person for their own purposes. Social engineering refers to any technique used by a threat actor that focuses on people and process, rather than on technology. The most common form of social engineering attack is a phishing email that tricks victims into giving up personal information such as passwords and credit card details. Phishing often masquerades as an official corporate email from an organisation's CEO or another trusted person within the company.

Read More

Topics: Penetration Testing, Social Engineering, Social Engineering Attack

Security Excellence Awards 2023 Rising Star Interviews | Nettitude

Posted by Nettitude on Apr 19, 2023

 

The Security Excellence Awards 2023, hosted by Computing, are a prestigious event that recognises outstanding achievements in cybersecurity. These awards celebrate individuals and companies that have demonstrated excellence, including the Rising Star category, which highlights emerging talents in the industry. This category shines a spotlight on individuals who have shown exceptional skills, dedication, and innovation in their roles and have the potential to become future leaders in the cybersecurity field.

We are delighted that among the nominees for the Rising Star category are two Nettitude colleagues Matthew Saunders and Chloe Sharp. Learn more about Matthew and Chloe below.

Read More

Topics: cybersecurity

What are the Different Types of Cybersecurity Testing? | Nettitude

Posted by Nettitude on Mar 31, 2023

 

When it comes to cybersecurity, one of the most important things you can do is test your system for vulnerabilities. Cybersecurity testing ensures you have all the necessary security measures in place and that they are functioning correctly. There are many ways to test the security of a system. Some are more thorough than others, and some take longer to complete. 

Read More

Topics: Penetration Testing, risk assessment, cybersecurity, Vulnerability Scanning, Vulnerability Assessment

The Cybersecurity Threats to Email: Explained | Nettitude

Posted by Nettitude on Mar 31, 2023

 

Despite the numerous messaging apps available, email remains the most used method of formal communication. This is because email is still associated with professionalism. However, as emails are preferred among businesses, this also makes them an ideal target for cybercriminals. 

Most data breaches occur for an economic reason—the attacker hopes to profit from the information they gain access to. Emails contain a lot of personal information already and can also be used to access other vital systems. This makes them an ideal entry point for hackers with varying motives.

Read More

Topics: cybersecurity, phishing, Email Security, zero-day

How to Secure Your API Against Cyber Attacks | Nettitude

Posted by Nettitude on Feb 28, 2023

 

As the world becomes increasingly interconnected, businesses must take steps to secure their data and protect their application programming interface (API). API security is vital for two reasons. First, APIs provide access to sensitive data, making them a prime target for attacks. Second, APIs can be used to launch attacks on other systems, making them a critical part of any security strategy. To protect your business, it is essential to implement robust API security measures. 

Read More

Topics: Penetration Testing, Website Penetration Testing, Web Application Penetration Testing Tools, Web App Penetration Testing

Benefits of Performing Code Reviews | Nettitude

Posted by Nettitude on Feb 28, 2023

 

When performing a penetration test, most companies focus on traditional methods with limited knowledge about the targeted system. In fact, if you are dealing with software or programming at a deeper level, there may be threats or vulnerabilities in the code that your team is not aware of. This is where a code review as a service comes in.

In essence, a code review is where every part of a program’s code is analysed to make sure there are no risks of vulnerability that someone else can take advantage of. It also ensures that any confidential information is hidden, which is a vital aspect of cybersecurity. 

Let’s take a closer look at the benefits of a code review as a service.

Read More

Topics: Penetration Testing, Digital Security Company, Code Review Service, Code Review as a Service

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all