LRQA Nettitude Blog

A technical assessment of a recent malicious email campaign against the Maritime sector

Posted by Nettitude on May 29, 2020

By Nettitude  

Are your email habits putting you at risk? Email is one of the most common means of communication but is also an easily and widely abused system for providing entry points for attackers into our organisations. In particular, during the recent pandemic, we have seen a significant rise in the amount of Phishing attacks carried out by email, meaning organisations need to be even more vigilant.

Nettitude uncovered a recent Maritime campaign focused on manipulating behaviours and common industry practices to deliver malicious payloads and compromise networks. In the following blog post, we’ll go over our findings on a recent attack, as well as how to spot this type of attack and the best methods for responding.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Cloud Penetration Testing - An Essential Guide

Posted by Nettitude on May 27, 2020

By Craig Boyle |Senior Security Consultant at Nettitude  

An Introduction to Cloud Services

Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) are the current leaders in Cloud Computing, and offer hundreds of services between them. The continuous expansion of features, inherent flexibility, and broad access offered by Cloud Computing are compelling reasons for its adoption, and organisations of all sizes are looking to migrate their workloads.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Elements of Managed Detection & Response

Posted by Nettitude on May 26, 2020

By Mike Buckley | Pre-Sales Consultant at Nettitude  

Security Information and Event Management (SIEM) Services have matured hugely in the last ten years. Moving from a compliance driven requirement, to becoming security best practice, SIEM Services are now recognised by various Security Frameworks. As the marketplace has developed, so too have the Managed Service offerings that protect SIEM technologies. As a result, it is no longer enough to deploy a SIEM technology with reliance on only the most basic of filtering to detect a potential threat.

This blog post will look at the development of Security Information and Event Management Services and will consider what additional security measures are now needed.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

An Introduction to the Lloyd's Register Cybersecurity Framework

Posted by Nettitude on May 21, 2020

By Elisa Cassi | Cyber Product and Services Manager 

Nettitude and Lloyd's Register have released the LR Cybersecurity Framework (CSF) for the Marine and Offshore sector, to complement the Cybersecurity Strategy paper that was previously published. The two documents are part of a suite of marine specific documents to support shipping organisations defining and implementing a robust and appropriate Cybersecurity Strategy.

This post focuses on the LR Cybersecurity Framework and provides an overview of how to use it effectively to deliver relevant and pragmatic cyber capability within your organisation for addressing cyber-threats.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, Marine and Offshore

Sniffing Secrets – Sensitive Maritime Communications Broadcast on a Global Scale

Posted by Nettitude on May 14, 2020

By Joel Snape | Security Researcher at Nettitude

One of the key enablers of business modernisation and efficiency in the Maritime Industry has been the availability and adoption of VSAT satellite connectivity. This has allowed vessels to stay connected to shore-based networks throughout their voyage: providing internet and corporate network access for crews and passengers; increasing the amount of administration which can be carried out at sea to save time in port and enabling remote monitoring and management of on-board systems.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, Marine and Offshore

Small Handling Errors in Incident Management

Posted by Nettitude on May 13, 2020

By Adrian Shaw | Senior Incident Response Consultant at Nettitude

Incident Response, in line with Information Security, is generally a challenge for a lot of organisations. Despite this, the good news is that cybersecurity is now being recognised as more of a crucial component of a business plan within organisations; many of which now have a programme in place to implement Incident Response capability. Whilst this is a step in the right direction, it should be ensured that these programmes should be iterative in order to facilitate the maturing of their capabilities.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Top Security Threats to Cloud Computing in 2020

Posted by Nettitude on May 7, 2020

By Nettitude

As of 2019, statistics showed that 60% of all workloads were being hosted on a cloud service, with this figure set to increase to 94% of workloads by 2021. This trend is the rise of businesses becoming reliant on cloud-based technology shows just how far we have come since the days of Floppy Disks and USB’s. Cloud computing has created a whole new way of collaborative working, with teams from across the globe connecting to shared resources in one central location. These new levels of capability have not only made our lives easier, but have enabled extended business growth that had have a positive impact on the economy, with companies now able to hire top talent from all corners of the globe.  There’s no doubt that the benefits of cloud computing have been significant.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area

Learning the Difference Between Vulnerability Testing vs. Penetration Testing

Posted by Nettitude on May 6, 2020

When it comes to security testing, there are two very common tests that you may want to consider. The first is vulnerability testing and the second is penetration testing. This blog post aims to explain what each kind of test is, and then define the difference between penetration testing and vulnerability scanning.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

How Can Shipping Companies Mitigate Cyber Risk?

Posted by Nettitude on May 1, 2020

 

Download the full whitepaper

The shipping sector has recently been facing wave after wave of setbacks as various economic and word events have caused disruption to the industry. The current pandemic has created a significant amount of challenges for shipping companies and cruise ships in particular, as global travel restrictions have been put in place and social distancing rules disrupt our usual way of working. However, BIMCO representative – Peter Sand has stressed that the industries setbacks are not a result of COVID-19, but rather a ripple effect of it’s spread, in which the introduction of the 2020 sulphur cap by the International Maritime Organisation and the failed attempt of the US-China phase one trade agreement have also had a profound impact.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area

How to Configure your Identity and Access Management Controls (IAM)

Posted by Nettitude on Apr 28, 2020

By Mike Buckley | Pre-Sales Consultant at Nettitude

Are you confident your critical business systems are secure? Willing to bet your career on it? Whilst fairly easy to manage if you have the right systems and procedures in place, if your identity and access management controls are not configured correctly, it could be like leaving the front door of your house wide open. The challenge that many of our clients’ face is working out to what extent they need to configure access to their business-critical systems. With too many controls in place, it can be disruptive to work flow and cause projects to become overdue. However, with too much freedom, you risk compromise to those critical systems. So how do you get the balance right?

Below, we’ve compiled some of our expert in-house knowledge to help businesses get a better idea of how to strike a balance when it comes to identity and access management controls.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all