top of page
Search


How to Set up a simple Web Honeypot to Catch Internal Intruders
What is a Honeypot? A honeypot is a decoy system that is designed to lure potential intruders, whether external or internal. The primary...


Penetration Testing vs. Vulnerability Scanning
When people misunderstand the differences between penetration testing and vulnerability scans, they are often missing a vital component...


How can I protect my organization from Ransomware?
Ransomware attacks are becoming more and more common, and they can be extremely disruptive to organizations. These types of attacks...


Penetration Testing: The Low-Down
In today's digital age, cybersecurity is a top priority for businesses of all sizes (or at least it should be). As cyber threats continue...


Breaches are More Expensive than Ever
The Ponemon Institute recently published their Cost of a Data Breach 2022 Report. For 17 years the Institute has released its compiled...


Cisco Network Breached Using Compromised Google Account
Networking giant Cisco said attackers have gained access to an employee’s VPN client using a compromised Google account. Cisco Systems...


Does my organization need a WAF?
As our economy turns to automation for business efficiency, we are seeing major growth of web applications and APIs (Application...


Cyber Insurance - The NeedToKnows
It seems a lot of things are getting more expensive these days. Well, if you are shopping for cyber insurance, get ready for another...


Log4Shell – Log4j RCE Vulnerability
Description Yesterday, 12/09/2021, it was discovered that companies utilizing an Apache logging component “log4j” are susceptible to a...


Multi-Factor Authentication: Best Practices
Organizations are realizing a fundamental truth that passwords alone are not enough to secure your accounts. You must supplement...


Routine and Continuous Penetration Testing
Penetration testing has become well-established as part of the cyber defence armoury – and indeed it’s a mandatory requirement in some...
bottom of page