Nettitude Blog

Android users still not ready to fully embrace security

Posted by Phil Buck on Jul 31, 2017 5:32:32 PM

Android malware variants are fairly common and tend to affect a large number of users at once. It was recently discovered that CepKutusu.com, an alternative Android app store in Turkey, has been serving a banking trojan to all users who download an app.[1] In addition, in June 2017, the CopyCat malware infected over 14 million devices mainly in South East Asia, with the threat actors behind the malware pocketing approximately $1.5 million in two months[2]. To compliment these reports, a recent study shows that the heaviest mobile user group (age 18-24) still lacks good security practices[3], creating a large target set for threat actors to potentially exploit.

Read More

Topics: Security Blog

4 Steps to take to analyse a phishing email

Posted by Jules Pagna Disso on Jul 24, 2017 2:28:05 PM

Nettitude are sent many suspected phishing emails for investigation. This week we received one that is a great example of how to analyse phishing emails in a bit more depth.

Read More

Topics: Security Blog

Nettitude ups its Incident Response game & joins FIRST

Posted by Adrian Shaw on May 30, 2017 1:05:09 PM

Having recently completed the process of joining FIRST, Nettitude’s Incident Response (IR) team were impressed with the recent release of their updated CSIRT service framework.

Read More

Topics: Security Blog

10 Steps to Successfully Manage Data Breaches

Posted by Adrian Shaw on Mar 30, 2017 12:00:13 PM

 

In 66% of incidents, the breach went undiscovered for a month or longer.

It is paramount that your organisation responds quickly and efficiently when your organisation experiences a data breach.

We’ve simplified a 10 step process to help you respond to a data breach. If you think your systems have been hacked, please contact our 24/7 security team immediately at solutions@nettitude.com

Read More

Topics: Security Blog

10 Steps to prepare for a data breach

Posted by Adrian Shaw on Mar 23, 2017 2:00:15 PM

Every day, over 3 million records are compromised from companies around the world. The fact is that cyber threats are no longer a question of IF, but WHEN, a breach will occur. It is vital for your company to have a cyber security plan in place so that you are ready to act if your organisation experiences a data breach.

Read More

Topics: Security Blog, Uncategorized

PCI DSS v3.2 - The One Year Countdown has begun! Again?

Posted by Peter O'Sullivan on Feb 9, 2017 9:00:21 AM

I am sure many of you are reading this title thinking "what is he talking about, v3.2 went live ages ago" and you would be correct, however version 3.2 of the PCI DSS continues with the concept of future requirements, meaning the one year countdown to the 31st January 2018 has begun.

Read More

Topics: Security Blog, Uncategorized

Soldier to Cyber

Posted by Media marketing on Feb 2, 2017 9:22:22 AM

As an ex-serviceman myself, I’m often approached by numerous service leavers who’ve asked how they can best prepare themselves for a career as an IT Security Consultant (AKA Penetration Tester / Ethical Hacker).

Read More

Topics: Security Blog, Uncategorized

The Big Freeze Is Coming – PCI DSS and change freezes

Posted by Stuart Wright on Dec 7, 2016 1:13:29 PM

With the festive period rapidly approaching, many people will no doubt be looking forward to an extended break and some well-earned time away from work. The run-in to Christmas can be a relatively peaceful time of the year for many people, with organisations reluctant to kick-off large projects, or make significant change at a time when their employees are taking leave.

Read More

Topics: Security Blog, Uncategorized

Drive My Information Security Car

Posted by Media marketing on Nov 18, 2016 4:34:53 PM

Maintaining your vehicle

Read More

Topics: Security Blog, Uncategorized

Global statistics: An insight in to Nettitude's latest honeypot findings

Posted by Media marketing on Nov 7, 2016 10:00:28 AM

Knowing the methods, sophistication and modus operandi of threat actors, and how this changes over time is fascinating. The Nettitude Global Honeypot network has been upgraded recently to capture more in-depth information and more interactions from attackers. This section gives you an overview of the trends and highlights from recently captured data.

Read More

Topics: Security Blog, Uncategorized

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts