When cheaper is not better: a quick guide to penetration tests

Posted by:

An IT administrator recently vented his frustration about having to conduct a penetration test.

He wanted an in-depth assessment of his system to make sure his network was operating with a low risk profile, all while still making all the required services available to his users.  

His firm has cloud services, several sensitive databases, internal and external networks, not to mention multiple operating systems (the designers “demanded” Apple products).

The idea was ...

Read More →
0

How to hire a good CISO: a short – but informative – guide

Posted by:

The deluge of cyberattacks hasn’t abated. Before we discuss what a CISO does and the different ways you can bring in CISO expertise into your organization, let’s take a quick at the current threat landscape.

As ever, we continue to be plummeted with scary news articles about companies suffering data breaches, ransomware attacks, dDoS attacks and vulnerability exploits.

It seems no industry is safe. We’ve read about attacks hitting hotels (Intercontinental), restaurants (Arby’s), telecommunications (Verifone, Verizon), healthcare ( Read More →

0

EU GDPR demystified: a straightforward checklist for US firms (PART THREE)

Posted by:

In this GDPR post, we provide you with a curated checklist to assist you during your  journey to compliance with the new European GDPR regulation, coming into effect in May 2018. Learn more about GDPR and its implications in our previous articles:

EU GDPR demystified: a straightforward reference guide for US firms – Part One 

EU GDPR demystified: a straightforward reference guide for US firms – Part Two

 

EU-GDPR REGULATION CHECKLIST FROM TBG SECURITY

 


Read More →
0

EU GDPR demystified: a straightforward reference guide for US firms (PART TWO)

Posted by:

Understanding whether you are impacted by GDPR is a key first step. A survey, carried out at RSA 2017 by Imperva, found that just 43% of companies are preparing for GDPR, 29% were not preparing, and 28% were unaware of any specific preparations being made.

Even if you have no base in one of the EU’s 28 countries, you can still be held accountable if you mishandle the personal data of EU residents. 

MORE FROM TBG SECURITY ON ...

Read More →
0

EU GDPR demystified: a straight-forward guide for US firms (PART 1)

Posted by:

Ahhh GDPR, the EU General Data Protection Regulation (EU-GDPR), the new European data legislation that revamps 20-year-old data protection laws to align with our digital age. It’s a radical and unprecedented piece of legislation, whittled down to a whopping 99 Articles, categorised in 11 Chapters.

Ugh.

AS if 99 articles isn’t bad enough, the effective date is coming sooner than you think….. May 2018, less than a year away.

Some of you, we know, are facing it head on, grappling with how ...

Read More →
1

We’ve all got password fatigue, but are NIST’s new policies wise?

Posted by:

Ah the necessary evil of passwords.

Those of us who have worked in organizations that require users to change passwords at set intervals know what I mean.

Typically every three to six months, users are requested to perform a password change – maybe in the form of an annoying pop-up alert. In some setups, the user is lock out of the system until a new memorable password (but one that follows the complex password creation guidelines) is set.

A ...

Read More →
0

WannaCry’s Kill Switch won’t work for proxy users. Patch now.

Posted by:

News reports published this Monday morning claim the WannaCry ransomware worm managed to spread to 150 countries, with 200,000 computers successfully attacked.

The attackers, according to their Bitcoin accounts, seemed to have raked in  an initial fee of $300 to decrypt the files being held for ransom, but that is set to double in three days. 

Whatever they end up with (and here’s hoping it’s a criminal record) it seems like a measly return considering the impact this ransomware worm ...

Read More →
0

Cyber attack video simulations: NEVER trust default security settings again

Posted by:

If you work in an organization that values its digital data and a good relationship with suppliers, partners and customers, I am willing to bet you have a number of cyber defenses in place.

Your web access will be likely protected by a robust firewall. Your wireless can perhaps only be accessed via a unique login. Maybe you even encrypt data that you store.

I bet you also ensure vulnerabilities are patched regularly, and ...

Read More →
0

Trump’s budget blueprint: what’s it mean for cybersecurity?

Posted by:

Last week, we saw the release of the US’s 2018 budget blueprint.

Before I even read the document, I did a random search on some security-related keywords within the 2018 budget to see how many times each one showed up. I found the results rather revealing. Make of this what you will:

  • Cyber: 15
  • Security: 68 (5 of which refer to Homeland Security)
  • Attack: 4
  • Privacy: ...
Read More →
0

US border controls, electronic devices and privacy: what to think about

Posted by:

Since the new US president’s executive order, designed to improve screening and vetting procedures in the name of reducing illegal immigration and terrorist threats, privacy groups like the American Civil Liberties Union and Electronic Frontier Foundation (or the EFF) have voiced concerns about an increase in the number of invasive digital practices during border inspections.

In other words – privacy groups saying that more travellers are being asked to surrender their devices and passcodes are often.

The Privacy groups ...

Read More →
0
Page 5 of 8 «...34567...»
})
SEC Cybersecurity Exams