Nettitude Blog

PCI Compliance – What have we learnt in 2020? | Nettitude

Posted by Nettitude on Jul 29, 2020 10:48:26 AM

By Stuart Wright | Head of Information Security Consulting at Nettitude

We are now over halfway through 2020, and it is fair to say that this has been an unusual year so far for everyone. Like many organisations, Nettitude has had to be agile in how we work, in which we have adapted to a whole new way of delivering consultancy. In addition, many of our clients have had to adapt their processes for how they receive assessments. As a result, we have all become very familiar with new ways of working and whilst this has been challenging to say the least, there is hope that it will create a new resilience in the way be approach challenges moving forwards. So how has the current climate affected PCI compliance? And what’s in store for the rest of 2020?

Below, we’ll take a look at some of the challenges faced around PCI compliance in recent months and reflect on what we’ve learnt, what needs to change, and the approach we’re taking to continue to ensure the effectiveness of our consultancy and assessment procedures.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, SEO Series

The Cost of Malware & its Impact on Business | Nettitude

Posted by Nettitude on Jul 21, 2020 5:03:17 PM

By Jenny Wu | Senior Incident Response Consultant at Nettitude

Malware in today’s world is a fact of life. As technology advances and devices are increasingly connected and evolving, so too are techniques and tools used to exploit this technology. With exploitation and malware rampant, the likelihood of your organization experiencing an attack and paying the price is set to increase.

Cyber-attacks and the damage they cause can be very costly to organizations. The costs of cyber-attacks are not limited to the immediate containment and eradication of threats. Operational costs, loss of revenue from downtime, emergency remediation and recovery solutions can exacerbate costs, not to mention the existence of intangible costs such as reputational loss. But what is the real impact of malware on business, and how can organization reduce its impact?

Read More

Topics: Cyber Security, Nettitude, Events, Security Blog, Cyber Security Blog, Download Area, SEO Series

The Importance of Network Security Consulting | Nettitude

Posted by Nettitude on Jul 17, 2020 2:30:59 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude

In today’s busy environment, it’s becoming very rare for an organisations IT support team to be well resourced, with plenty of time on their hands. Having worked closely with our client’s IT Teams, one of the most frequent issues we hear about which poses a risk to an organisation’s cybersecurity is not having enough time. With cyber-threats constantly evolving, it is essential for IT teams to have time to attend training courses and gain experience on everything they are expected to support.

IT Support teams don’t have an easy job; they have to contend with a multitude of issues across a multitude of different technologies, all the while trying to appease their user base. Alongside other technologies that require in depth specialist knowledge, networks can be a particular challenge for IT teams.

In the following blog post, we’ll take a look at some of the most challenging issues that IT support teams in SME’s face, analyse the importance of making time for essential training and professional development, and examine the role of network security consulting.

Read More

Topics: Cyber Security, Nettitude, Security Blog, Cyber Security Blog, Download Area, SEO Series

Nettitude gain the STAR-FS accreditation

Posted by Nettitude on Jun 16, 2020 4:09:44 PM

By Ben Turner | Managing Principal Security Consultant at Nettitude  

We're pleased to announce that Nettitude have been listed as the first STAR-FS accredited company that are able to deliver both ‘Threat Intelligence’ and ‘Intelligence-Led Penetration Testing’ Services.

STAR-FS is a new regulatory tool used to assess the effectiveness of a firm’s cyber capability and risk profile. This assessment created by CREST is designed to be delivered by the Threat Intelligence (TI) and Penetration Testing (PT) providers. STAR-FS was designed to deliver similar outcomes to that of CBEST while being less onerous and resource intensive on the regulatory services that back it up.

So what does this mean for our customers within the financial services sector? In the following blog post, we'll discuss the details of the STAR-FS accreditation and how this will impact on our future business within the financial sector. 

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

A Guide to the Fundamentals of Infrastructure Penetration Testing

Posted by Nettitude on Jun 9, 2020 5:01:30 PM

By Tom MacDonald | Senior Security Consultant at Nettitude  

As more organisations begin to understand the importance of maturing their cybersecurity strategy, focus is shifting away from a more ‘compliance-based’ plan and is logically developing towards a reactive security posture with a more modern, proactive and continual assurance approach. Infrastructure penetration testing is a crucial part of an ongoing security assurance programme, as well as being a distinct step in the journey from  

In the following blog post, we’ll cover the reasons why an organisation would need an infrastructure penetration test, as well as the key as well as the key considerations that need to be made in advance of one.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

The future of firewalls and their protection of business networks

Posted by Nettitude on Jun 4, 2020 4:55:06 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude  

Firewalls have been around for what seems a very long time now. Firstly, they were considered in theory at the end of the 80s as a simple packet filter, but they soon progressed within a decade to a stateful offering, pioneered by the likes of Check Point with a usable front end.  It seems remarkable now that a Firewall that previously only inspected the first few packets of a connection to allow or deny was considered “next-gen”, but that’s just a measure of how far cybersecurity has moved on in the last twenty years. 

Whilst Check Point and Cisco ruled the market for a while, until Palo Alto came in and disrupted the marketplace with their application-based policies; there has been a big shift in how the Firewalls inspect traffic, and how policies have moved from traditional IP based rules to being able to allow particular users access to particular applications, enabling much more granularity and control.  Many more features have come (and in some cases gone) since then and of course now there’s an argument that there’s no perimeter any more, so what does that mean for the Firewall?

In this blog post, we’ll look at the function of modern firewalls and what’s in store for the future of firewall development and functionality.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

How a Remote Cybersecurity Review Can Reduce Cyber-Risk

Posted by Nettitude on Jun 2, 2020 9:46:09 AM

By Nettitude  

At Nettitude we have the great advantage of seeing first-hand how organisations of all shapes and sizes approach cybersecurity. And like all good consultants, we are magpies; borrowing the best and worst of what we see and absorbing it into our accumulated knowledge. This approach means that when we advise our customers, we’re able to draw on a vast body of knowledge and experience, saving our customers’ time by avoiding the mistakes we have observed within other organisations.

In this blog post, we'll look at why the NCSC 10 Steps guidelines are a good place to start when evaluating your cybersecurity posture, as well as advice on how to implement these guidelines. 

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

A technical assessment of a recent malicious email campaign against the Maritime sector

Posted by Nettitude on May 29, 2020 11:41:07 AM

By Nettitude  

Are your email habits putting you at risk? Email is one of the most common means of communication but is also an easily and widely abused system for providing entry points for attackers into our organisations. In particular, during the recent pandemic, we have seen a significant rise in the amount of Phishing attacks carried out by email, meaning organisations need to be even more vigilant.

Nettitude uncovered a recent Maritime campaign focused on manipulating behaviours and common industry practices to deliver malicious payloads and compromise networks. In the following blog post, we’ll go over our findings on a recent attack, as well as how to spot this type of attack and the best methods for responding.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Cloud Penetration Testing - An Essential Guide

Posted by Nettitude on May 27, 2020 11:46:09 AM

By Craig Boyle |Senior Security Consultant at Nettitude  

An Introduction to Cloud Services

Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) are the current leaders in Cloud Computing, and offer hundreds of services between them. The continuous expansion of features, inherent flexibility, and broad access offered by Cloud Computing are compelling reasons for its adoption, and organisations of all sizes are looking to migrate their workloads.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Elements of Managed Detection & Response

Posted by Nettitude on May 26, 2020 3:03:18 PM

By Mike Buckley | Pre-Sales Consultant at Nettitude  

Security Information and Event Management (SIEM) Services have matured hugely in the last ten years. Moving from a compliance driven requirement, to becoming security best practice, SIEM Services are now recognised by various Security Frameworks. As the marketplace has developed, so too have the Managed Service offerings that protect SIEM technologies. As a result, it is no longer enough to deploy a SIEM technology with reliance on only the most basic of filtering to detect a potential threat.

This blog post will look at the development of Security Information and Event Management Services and will consider what additional security measures are now needed.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of The Lloyd's Register Group, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts