How often should I schedule a penetration test? It’s commonly said that penetration tests and vulnerability scans should be performed on a regular basis to ensure all vulnerabilities, including newly discovered ones, are found and remediated before they can be exploited by cyber criminals. Many companies wait too long before conducting a penetration […]

Read More

THE IMPORTANCE OF AN ISO 27001 INTERNAL AUDITOR.   In Clause 9.2 of the ISO 27001:2013 standard, it states that the purpose of the internal audit is to determine whether the ISMS:   conforms to the organization’s own requirements for its information security management system; and the requirements of this International Standard; is effectively implemented […]

Read More

A comprehensive cyber security strategy is composed of technology, processes and people. The first component is about the latest tools and resources (such as firewalls, anti-phishing and anti-malware software) that can be implemented to detect, protect and mitigate cyber risks.   Processes and polices are about the courses of action that everybody in the company […]

Read More

  While a data breach damages the confidentiality, availability or integrity of information, your ability to avoid breaches rests on three pillars: people, processes and technology.   Read these top tips from an expert. Start with your staff   Promote an ethical environment for managing information security – starting from the top and promoting it […]

Read More

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.   Every year new toys, games, and devices come out with increasing levels of Internet connectivity. Some of these lack fundamental security precautions and end up on […]

Read More

IDENTIFY YOUR VULNERABILITIES BEFORE HACKERS DO.   Cyber-crime is a growing problem, costing businesses and governments millions each year. Although there are many ways to secure systems and applications, the only way to truly know how secure you are is to conduct an assessment or series of tests, often called a penetration test. By performing a […]

Read More