LRQA Nettitude Blog

How to Configure a Firewall Policy | Nettitude

Posted by Nettitude on May 6, 2021 12:10:45 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude 

Firewalls have been around for many years in various shapes and sizes, from simple Access Control Lists, to full “Next-Gen” threat prevention and sandboxing. They have evolved to (mostly) embrace Cloud strategies and remain an important security tool, protecting important assets and securing workspaces. However, they are usually perceived as a necessary evil.

It can be common to encounter applications not working as they should be after a firewall has been implemented. By their very nature, Firewalls should be preventing a lot more traffic than they permit, and it can be a challenge to configure them correctly to allow this access whilst at the same time not reverting to an overly permissive policy. As a result, organisations can rush through the process, sending applications live with rules in place that are designed as a quick fix, rather than a long-standing solution.

In order to correctly onboard clients to NOC services, Nettitude’s Network Operations experts must examine the integrity of a firewall and its setup to ensure the basics are in place. In this blog post, we’ll take a look at the basics of configuring a firewall policy.

Read More

Topics: Cyber Security, Nettitude, Security Blog

How ICS Testing Protects Against Cybersecurity Threats | Nettitude

Posted by Nettitude on Apr 22, 2021 11:22:17 AM

By Fan Zhang | Cybersecurity Business Manager, APAC

When we talk about “ICS (Industrial Control Systems) Cyber Attacks” to organisations, we often mention that the systems are absolutely disconnected (air-gapped) from the IT network and from the Internet, so they can never be compromised. But is this always true?

From the growing number of ICS attack cases, we know that it is not the case and in this blog post, Nettitude aims to define what an ICS cyber-attack is and how organisations can protect themselves against them.

Read More

Topics: Cyber Security, Nettitude, Security Blog, ics cyber security, ics cyber security threats, ics threat landscape, ics network security, ics testing

How JWT Hijacking Can Be Prevented | LRQA Nettitude

Posted by Nettitude on Apr 16, 2021 4:03:19 PM

By Vanessa Santos | Security Consultant at LRQA Nettitude

Json Web Tokens (JWTs) are commonly used in many applications to validate the client’s identity. The JWT token is provided during authentication in case of success and this is then used in all authenticated interactions to the application.

The validation of user’s identity is based on the user’s information stored in the JWT token which is signed by the server using JSON Web Signatures. The information exchanged within the JWT can also be encrypted using JSON Web Encryption however this is not widely used.

Although the JWT token can be used in web applications there is a number of caveats that come with the choice of implementing JWT authentication tokens that can result in them being hijacked.

In this article we will be discussing these security implementation issues and will uncover ways of preventing an attacker from hijacking JWT tokens.

Read More

Topics: Cyber Security, Nettitude, Security Blog, JSON Web Token

Why File Integrity Monitoring is Critical | Nettitude

Posted by Nettitude on Apr 9, 2021 5:28:13 PM

By Mike Buckley | Presales Consultant at Nettitude

49% of US organisations have suffered a data breach in the past year. With almost half of the nation’s businesses losing critical data, something is surely wrong.

Data is considered as one of the most important assets a business can have; it’s essentially the life blood of any organisation. Yet two of the biggest concern’s businesses have is the privacy and security of their data - and rightly so as once it’s compromised, it can cripple an organisation rapidly. Research from the University of Maryland indicates that hackers are active across the globe every 39 seconds. This means that a single computer unit could be under attack multiple times, every minute of the day. But how would you know If there’s a security breach?

File Integrity Monitoring (FIM) software is one of the solutions to this challenge, yet many businesses are unaware that this tool is available to them. However, in the words of Nicolaus Copernicus – To know that we know what we know, and to know that we do not know what we do not know, that is true knowledge.

Been as you’ve landed on this blog post; you’ve taken first step is identifying that your organisation could benefit from FIM. The second step is to find out what FIM is and how it works exactly.

This is where we can help!

Read More

Topics: Cyber Security, Nettitude, Security Blog, fim, file integrity monitoring, fim system, fim software

Why Hackers Target Healthcare with Cyber Attacks | Nettitude

Posted by Nettitude on Mar 22, 2021 10:40:08 AM

By Sam Bohnel | Security Consultant at Nettitude 

May 2017, the ransomware attack named WannaCry targeted computers running outdated and unpatched Microsoft Windows operating systems. The cyber-attack encrypted user’s files and unsuspecting victims were held at ransom to return their data. It was estimated the attack affected roughly 300,000+ plus computers worldwide.

One of the major victims of WannaCry was the National Health Service hospitals in England and Scotland, with up to 70,000 devices said to be infected by the ransomware cryptoworm. Critical medical devices including MRI scanners, blood storage refrigerators and theatre equipment were affected, resulting in severe disruption to the NHS and an estimated £92 million-pound expense.

WannnCry is just one case study of numerous health organisations becoming victims of cyberattacks. But, just why is the health sector such an enticing target for hackers?

Read More

Topics: Cyber Security, Nettitude, Security Blog, Financial Services, Financial Security

How Endpoint Detection and Response can improve healthcare cybersecurity | Nettitude

Posted by Nettitude on Mar 15, 2021 5:28:36 PM

By Jenny Wu | Senior Incident Response Consultant at Nettitude


The move to the Cloud and remote working models has changed the way networks are connected. Today, we are shifting focus from security to protecting assets rather than the traditional perimeter. Traditional anti-virus is no longer able to keep up with newer attacks and vulnerabilities, allowing compromises to occur more frequently; especially for the healthcare industry which is frequently targeted. They therefore need additional protection in the form of Endpoint Detection and Response (EDR) Tooling.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Financial Services, Financial Security

Cybersecurity Trends – Evolve 2021 Webinar | Nettitude

Posted by Nettitude on Mar 15, 2021 11:16:25 AM

By Nettitude

Cybersecurity. While the rest of the world has almost shut down this past year, cybersecurity is one of those industries where the cogs keep on turning. In fact, the vulnerabilities of most other industries have created a sharp rise in cyber-attacks during this time. From ransomware attacks on the healthcare sector, to increased risk for financial services as organisations shift their focus to survival mode.

Our Head of Threat Intelligence and Advisory Consulting, Anthony Long, recently presented at the EVOLVE 2021 Webinar on "Cyber Security In A World Under Pressure." In the webinar, we took a look at the impacts of the pandemic and how this has triggered an increase in cybercrime. 

Read More

Topics: Cyber Security, Nettitude, Security Blog, Financial Services, Financial Security

Introducing the Nettitude Bug Bounty Programme | Nettitude

Posted by Nettitude on Mar 12, 2021 5:09:02 PM

By Nettitude

Today, we’re excited to announce the launch of our Nettitude Bug Bounty programme .


Over the past few months, we’ve been running a Bug Bounty trial with a number of our clients, which we’re pleased to say has been successful. Now, we’re ready to open our Bug Bounty service up to the world.

Read More

Topics: Cyber Security, Nettitude, Security Blog

Nettitude Choose to Challenge | International Women’s Day 2021

Posted by Nettitude on Mar 8, 2021 9:57:35 AM

By Nettitude

Today, just 19% of the technology sector is represented by females. While it’s true that the industry still has a long way to go in achieving true gender equality, we are slowly and surely beginning to see change.

Nettitude can attest to this. As an organisation within the technology sector, Nettitude are proud to be one of few organisations within our industry to be led by a female CEO. Under the direction of Karen Bolton our values and vision for the future are bright when it comes to women making an impact, in which each Nettitude colleague is viewed as an important and impactful individual, despite their gender.

Read More

Topics: Cyber Security, Nettitude, Security Blog

Are You Protecting Your Critical Assets and Customer Data? | Nettitude

Posted by Nettitude on Feb 26, 2021 3:09:23 PM

By Nettitude

A cyber breach can be a terrible thing for any company to go through, with significant impacts such as halting production, reputational damage, regulatory fines and operational viability. The cost of a breach is often in the millions as highlighted in IBM’s recent report detailing average breach costs across industry verticals. Data breach prevention measures exist, but are often not sufficiently invested in to prevent the worst-case scenarios from developing.

In this blog post, we’ll take a look at the true cost of a data breach and identify how objective based testing can help organisations to reduce their risk.

Read More

Topics: Cyber Security, Nettitude, Security Blog

Subscribe Here!

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Recent Posts

Posts by Tag

See all