Penetration Testing Archive
Most people generally understand what happens after a data breach: the crooks use or sell the information to make a quick profit, and organisations must spend money recovering from the incident and paying legal fees and penalties. But that’s only …
In this blog, we look at the ongoing threat of debit and credit card fraud, explaining why it appeals to cyber criminals, what they do with the stolen information and how implementing the requirements of the PCI DSS (Payment Card …
Vulnerability assessments are an invaluable way of identifying vulnerabilities in your networks or applications. Penetration testers use them to review target systems and identify potential attack vectors, weaknesses and entry points, while administrators use them to identify previously unknown or …
Conducting a successful penetration test is a challenge for even the most experienced tester. It involves much more than simply running tools and probing systems. Rather, it requires a lot of skill and experience, as testers need to know what …
The EU General Data Protection Regulation (GDPR) will soon be in effect, but many organisations are still working towards compliance. One part of the Regulation tripping people up is Article 32: Security of processing. It describes the technical and organisational …
Article 32 of the EU General Data Protection Regulation (GDPR) mandates that organisations implement “appropriate technical and organisational measures” to manage risks. It provides a handful of examples of those measures, but it doesn’t go into detail about what they …
The Information Commissioner’s Office (ICO) has warned that organisations could be punished for existing vulnerabilities when the EU General Data Protection Regulation (GDPR) is enforced. Although the GDPR won’t take effect until 25 May 2018, organisations that fail to identify …
NHS Digital has announced a £20 million project to improve data security across the service. The Security Operations Centre will provide: A monitoring service which analyses intelligence from multiple sources and shares guidance, advice and threat intelligence with health care …
We’ve discussed the importance of penetration testing a lot recently because many organisations aren’t aware that it should be an essential part of any cyber security strategy. Many successful attacks could have been mitigated – or prevented altogether – with …
Over the past few weeks, we’ve discussed the overlooked importance of penetration testing in staying cyber secure. Many successful attacks could have been mitigated – or prevented altogether – with effective testing, but too few organisations commit to regular tests. …