LRQA Nettitude Blog

How to Recover From a Data Breach: The Steps To Take

Posted by LRQA Nettitude on Jun 30, 2023

A data breach could take over 100 days to be spotted. An additional 60 days may be needed to recover from it. However, you can recover from a breach within 30 days with a recovery plan, saving you resources. Your recovery team’s swift reaction to any signs of a data breach will help you recover as soon as possible.

Read More

Topics: Penetration Testing, cybersecurity, Data Breach, network security, data privacy security

Security Excellence Awards 2023 Rising Star Interviews | Nettitude

Posted by Nettitude on Apr 19, 2023

 

The Security Excellence Awards 2023, hosted by Computing, are a prestigious event that recognises outstanding achievements in cybersecurity. These awards celebrate individuals and companies that have demonstrated excellence, including the Rising Star category, which highlights emerging talents in the industry. This category shines a spotlight on individuals who have shown exceptional skills, dedication, and innovation in their roles and have the potential to become future leaders in the cybersecurity field.

We are delighted that among the nominees for the Rising Star category are two Nettitude colleagues Matthew Saunders and Chloe Sharp. Learn more about Matthew and Chloe below.

Read More

Topics: cybersecurity

What are the Different Types of Cybersecurity Testing? | Nettitude

Posted by Nettitude on Mar 31, 2023

 

When it comes to cybersecurity, one of the most important things you can do is test your system for vulnerabilities. Cybersecurity testing ensures you have all the necessary security measures in place and that they are functioning correctly. There are many ways to test the security of a system. Some are more thorough than others, and some take longer to complete. 

Read More

Topics: Penetration Testing, risk assessment, cybersecurity, Vulnerability Scanning, Vulnerability Assessment

The Cybersecurity Threats to Email: Explained | Nettitude

Posted by Nettitude on Mar 31, 2023

 

Despite the numerous messaging apps available, email remains the most used method of formal communication. This is because email is still associated with professionalism. However, as emails are preferred among businesses, this also makes them an ideal target for cybercriminals. 

Most data breaches occur for an economic reason—the attacker hopes to profit from the information they gain access to. Emails contain a lot of personal information already and can also be used to access other vital systems. This makes them an ideal entry point for hackers with varying motives.

Read More

Topics: cybersecurity, phishing, Email Security, zero-day

An Introduction to Zero-Click Attacks | Nettitude

Posted by Nettitude on Dec 30, 2022

 

Cybersecurity is a constant battle as there are always new threats to consider and safeguard against. With companies and individuals storing an incredible amount of personal and business data on their devices, keeping this information protected requires rigid security practices.

However, one of the most challenging cyber threats to prevent is zero-click attacks. These are especially dangerous because, unlike more common cyberattacks, a victim’s devices can be compromised without them ever knowing. So, what can be done? 

Here, we explore how to recognise these malicious malware attacks while offering tips that help prevent your devices from being exploited.

Read More

Topics: cybersecurity, zero click attack

Steps to reduce alert fatigue in your cybersecurity team | Nettitude

Posted by Nettitude on Aug 31, 2022

 

Effective cybersecurity relies on your team being alerted to potential issues within your systems and networks. However, the sheer number of alerts generated by improperly configured cybersecurity technology and frameworks causes analysts to develop alert fatigue, as countless false positives and minor issues lead to significant disruption and distraction.

With so many potential threats and a limited number of resources, it can be difficult to prioritise which alerts to investigate. As a result, your team may become overwhelmed and start to ignore or dismiss potentially serious threats. In addition, constantly responding to false positives can take valuable time away from other tasks, such as investigating potential incidents. So, what can we do to resolve the challenging problem of alert fatigue?

Read More

Topics: Cyber Security, cybersecurity, Threat Landscape, Alert Fatigue

Why Marine Vessel Owners Should Consider LR Cybersecurity ShipRight Certification | Nettitude

Posted by Nettitude on Mar 31, 2022

We often hear about unwanted cyber interventions harming operations. You might think it’s not relevant to the maritime industry – you’d be wrong.

Not immune from cybersecurity incidents, a growing number of attackers are focusing their activity on the marine and offshore sector[1][2][3]. That includes cargo ships and cruise liners. Both are attractive targets due to high-value assets and likely vulnerabilities.

Whilst the picture might seem alarming, specialist guidance and procedures exist to help you mitigate your risk, securing vessels from harmful attacks. Created by cybersecurity specialist Nettitude, and used by Lloyds Register, the LR Cybersecurity ShipRight [4] certification is one such example.

Read More

Topics: Marine and Offshore, Marine, cybersecurity, ShipRight Certification

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all