Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key. How are wireless networks … Read more
In this article we will outline what is meant by physical security in the context of cyber security. We will have a look at the top ten best practices for securing your environment physically. Most of these you may think are common sense. However, you really would be amazed to discover how many reputable
Regular penetration testing is becoming increasingly important. What many business owners seem to want to know, however, is when to arrange a system test. Any application that processes personal data, whether in the storing or retrieving personal data, needs to have its security tested regularly according to GDPR Article 32 (1.D). Many systems have never … Read more
Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These vulnerabilities can have wide-reaching consequences to the application as well as the data stored within its database.
FaceApp has been getting a huge amount of attention in the media lately for being the hottest new craze that everyone, including celebrities, seems to be using to modify faces in pictures to alter their appearance. Also receiving a great deal of media attention is its seemingly nefarious terms of service that none of us … Read more
The General Data Protection Regulation (GDPR) came into effect on the 25th of May 2018 and has already caught out over 200,000 businesses in its first twelve months seeing data breach complaints go up by 160% and fines totalling 56 million euros – 50 million of which was paid by Google alone! Failure to comply … Read more