The lack of an ‘edge’ that clearly defines the cloud environment that your organisation is considering sending your data to, can
Krypsys
Data Protection – GDPR Checklist
The General Data Protection Regulation (GDPR) requires that, by 2018, any company that wishes to do business in the EU, will need to collect, store and use personal information more securely. Companies that have not started addressing this yet will, potentially, have a lot of the compliance work to get through in 2017. With the …
2016 Cyber Security Trends Summary
The majority of UK businesses now recognise the importance of cyber security. This, in part, has been driven by the fact that E-commerce has become much more important to UK companies and has doubled since 2008. Added to that, media coverage of high-profile breaches and their consequences has moved cyber security up the corporate agenda. …
Ten Basic Network Security Recommendations
Krypsys experts offer advice on a daily basis to network administrators so that they can better secure their companies’
New Password Rules from NIST
As things stand, passwords are still the cornerstone of user security. But, with so many passwords to think up and remember
Barracuda Web Application Firewall Review
The Barracuda Web Application Firewall (WAF) offers complete protection from application-layer distributed denial-of-service
Implementing and Extending Your ISO 27001 Scope
The good news is that most organisations these days have some form of security controls in place. There will probably be a firewall, even if it’s the one provided by the ISP which is integrated into the wireless router. There will probably be some anti malware software in place, even if it’s some kind of …
7 Simple Smart Phone Security Tips
This article features 7 simple smart phone security tips that can easily be implemented by you, your co-workers, friends and
PCI Pen Test Requirements Can Cause Confusion
Business IT Teams will almost certainly be aware of the importance of finding security vulnerabilities within the company’s
Five Top Wifi Security Tips
Wireless technology can make intrusion attempts easier because the attacker does not need physical access to the network
You Can’t Just Rely on Your Anti-Virus Solution
An antivirus solution is now a standard fixture in the IT security arsenal of any serious IT shop. It should allow the system to scan static files on disk and also programs that are resident in memory for suspected malicious activity. This is clearly good practice and is, indeed, a basic essential, but attackers that …
Does ISO 27001 Require Penetration Testing?
We are often asked whether vulnerability assessment or penetration testing are required for ISO 27001 compliance.
So You Need to Conduct a Firewall Review
Firewall audits receive a lot of attention nowadays due to standards such as PCI-DSS, ISO 27001 and SOX and HIPAA
Social Engineering Testing and PCI
The term social engineering refers to the practice of attempting to compromise a system through the manipulation of those who
PCI Segmentation Checks – What’s Required
PCI DSS requires that network segmentation controls are penetration tested and that the methods used are operational