Nettitude Blog

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 2: Piracy, ECDIS Malware, and VDR Tampering

Posted by Nettitude on Oct 16, 2019 10:17:10 AM

 

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

How to Detect a Cyber Security Incident

Posted by Nettitude on Oct 7, 2019 1:29:01 PM

 

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

The New IMO Maritime Cyber Security Guidelines

Posted by Nettitude on Oct 2, 2019 5:48:16 PM

IMO Cyber Security Guidelines (MSC-FAL.1/Circ.3) and Resolution MSC.428(98) to be Adopted by 1 January 2021

The International Maritime Organization (IMO) has issued MSC-FAL.1/Circ.3 Guidelines on Maritime Cyber Risk Management. The guidelines provide high-level recommendations on maritime cyber risk management to safeguard shipping from current and emerging cyber threats and vulnerabilities and include functional elements that support effective cyber risk management. The recommendations can be incorporated into existing risk management processes and are complementary to the safety and security management practices already established by IMO.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Lloyd's Register and Nettitude have Released a New Procedure for the Assessment of Cyber Security Controls for Ships and Ship Systems

Posted by Nettitude on Oct 2, 2019 5:36:50 PM

 

  • The new procedure is part of the “ShipRight Procedures” within LR Rules. Compliance with it makes a ship or a ship system eligible for a ShipRight Notation and/or a Descriptive Note.
  • In cases where a procedure is applied to a vessel outside of the classification regime, a certificate of compliance may be issued if appropriate.
  • The procedure was developed to provide an independent assessment of the effectiveness of cyber security controls within connected, integrated and internet-enabled systems and environments.

The development of Lloyd's Register's classification standards is a dynamic process. As the threats evolve, the standards adapt to ensure that safety, operability, performance and the security of vessels are kept to the desired level during their service life.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

The Top 8 Cyberthreats to Marine and Offshore Organisations, Part 1: Phishing and Physical Infiltration

Posted by Nettitude on Sep 27, 2019 9:59:18 AM

Today’s cyberattacks occur 24x7. Although most of the generic attacks can be prevented through basic security controls, more advanced attempts often slip through undetected, and the time from vulnerability identification to exploit tool creation is continually reducing. Attacks that would have been classed as sophisticated 12 months ago now appear in commodity based malware that can be freely found on the dark web.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Securing Superyachts from Cyber Attack

Posted by Nettitude on Sep 24, 2019 12:43:04 PM

By Tom MacDonald, Managing Principal Security Consultant at Nettitude

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Is Email Putting Marine and Offshore Organisations at Risk?

Posted by Nettitude on Sep 20, 2019 3:30:26 PM

By Joel Snape, Senior Threat Researcher at Nettitude

Sometimes it feels like everything runs on email. We all know we get far too many each day, and crucial information is constantly being sent back and forth between individuals and companies. It has become so common that often we don’t stop to question whether it is the most effective way of carrying out a task, and whether it is exposing us to harm. One area in which email seemingly cannot be escaped is in communication with port authorities; this could be anything from arrival notifications to requests for bunkering, ballast discharge or diving. Although online reporting systems such as the CERS portal do exist, in many cases vessels still have to fill in a Word form or Excel spreadsheet and email it to the relevant authority. They may also then have to respond to follow up questions, or get more paperwork to fill out.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Tackling Cyber Threats in the Cruise Industry

Posted by Nettitude on Sep 17, 2019 4:19:59 PM

By Tom MacDonald, Managing Principal Security Consultant at Nettitude

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

ISO27701 & ISO27001: What's the Difference? And what does this mean for your Organisation?

Posted by Nettitude on Sep 5, 2019 5:57:29 PM

ISO27701:2019, a new international standard concerned with the management of personal data, has been published. ISO27701 is a Privacy Information Management System (PIMS), and provides an extension to the better known ISO27001:2013 Information Security Management System (ISMS).

In this blog, we’ll take a brief look at the new standard, how it differs from ISO27001:2013, and how it can benefit your organisation.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

Leaving the Armed Forces? Our Guide to going from Soldier to Cyber, Part 3

Posted by Nettitude on Sep 4, 2019 2:51:53 PM

By David Lenehan, Security Consultant at Nettitude

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Security Testing, Cyber Security Blog, Download Area, Research & Innovation

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts