Nettitude Blog

Endpoint Protection and Visibility – EPP & EDR | Nettitude

Posted by Nettitude on Sep 10, 2020 5:40:00 PM

By Mike Buckley | Presales Security Consultant at Nettitude

What is an Endpoint

Firstly, what is an endpoint? An endpoint is usually a device which communicates with the network to which it is connected. This can be a myriad of devices including, laptops, mobiles, tablets, servers etc. As the attack vectors vary hugely depending on where we focus, this blog will primarily target the laptop/desktop world. Risks to all endpoints may be similar, but the mitigations are very different.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, risk assessment, SEO Series, endpoint protection, endpoint security, endpoint protection software

Technical Solutions for Data Loss Protection | Nettitude

Posted by Nettitude on Sep 1, 2020 4:32:59 PM

By Mike Buckley | Presales Security Consultant at Nettitude

There are a few important principles that should be keeping a responsible CIO/CISO awake at night. Most certainly, one of those would be the loss or leakage of business-critical data such as customer Personal Identifiable Information (PII) or financial details. One of the primary functions of their role is to recognise this and put into place processes and technical controls to lower the risk of that data being exposed. We only have to look in the media to see numerous examples of data breaches. Threat actors as we now call them have been trying to access data of various kinds stretching back into the 1980s when modems connected everything together. Unfortunately for the CIO/CISOs of today there are compliance frameworks such as GDPR which firmly put the burden of responsibility on their shoulders.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Security Testing, Cyber Security Blog, Download Area, risk assessment, SEO Series, data protection solutions, data loss protection, data leakage protection

The Ultimate Guide To Cyber Security Risk Assessments

Posted by Ben Rothke on Aug 14, 2018 5:43:32 PM

The world loves assessments. Be it the endless Top 10 lists on Facebook, from the Forbes 500 to the FT 1000 and more. Smaller assessments include a person’s annual physical, car inspections, report cards from school, and more. In the world of information security, a risk assessment is an invaluable method for a firm to determine their information security posture. There is a lot at stake when a firm performs a cyber security risk assessment, so it’s imperative that it be done right.

Want to learn how to do it right? Keep reading.

 

 

Read More

Topics: Cyber Security, risk assessment

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of The Lloyd's Register Group, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts