The Vital Role of Penetration Testing in 2024

The Vital Role of Penetration Testing in 2024

In an age where technology permeates every aspect of our lives, cybersecurity has become paramount. With the increasing sophistication of cyber threats, it’s no longer sufficient to merely implement security measures and hope for the best. Instead, organisations must adopt proactive approaches to identify and mitigate vulnerabilities before they are exploited by malicious actors. This …

Read More

Enhancing Cloud Data Security: The Role of Penetration Testing in ISO 27018 Compliance

Penetration testing for ISO 27018

In the dynamic realm of cloud computing, organisations are increasingly entrusting their sensitive data, including personally identifiable information (PII), to third-party cloud service providers (CSPs). This shift brings forth a heightened responsibility for CSPs to safeguard this data in accordance with stringent data protection standards, such as ISO 27018. While ISO 27018 provides a comprehensive …

Read More

Is Manual Penetration Testing Still Necessary

Is Manual Penetration Testing Still Necessary

In the world of cybersecurity, organisations often rely on both manual penetration testing and automated vulnerability scans to identify and mitigate security risks. While automated scans can be useful in identifying low-hanging fruit vulnerabilities, manual penetration testing offers several benefits that cannot be replicated by automated tools. In this blog post, we will explore the …

Read More

What to Look for in a Pen Testing Company

What to Look for in a Pen Testing Company

Cybercriminals and penetration testing companies have a lot in common. Both search for vulnerabilities in your infrastructure; however, whilst the former may be looking to exploit these vulnerabilities in a way that would be detrimental to your business, the aim of the latter is to support you to better protect your company and its customers. …

Read More

Do You Need Penetration Test for the GDPR?

Do You Need Penetration Test for the GDPR

Do you need penetration test to comply with GDPR? The GDPR requires that you assess applications and criticalinfrastructurefor security vulnerabilities and that the effectiveness of your security controls are tested regularly.  Services such as penetration testing and regular vulnerability assessments will help meet this requirement. The GDPR brings a number of changes including breach reports being legally required within …

Read More

Cyber security: ‘resilience’ is the key to thwarting cyber-attacks

Can any business ever defend against every potential cyber-attack or protect its networks from hackers? The short answer to that is no. Determined hackers are enterprising and surprisingly skilled at finding even the smallest chink in your business’ security network. So does that mean you shouldn’t bother with security at all? Well, no: on the …

Read More

Cyber-crime: Cisco claims retailers remain one step behind hackers

What lessons have we learned from last year’s massive cyber-attack on Target where hackers seized the personal and bank card information of more than 110 million customers? Well, according to Cisco Systems, the global networking and technology giant, the answer is not a lot. Yes there has been a scramble to come up with some …

Read More

New study shows that most SMEs mistakenly believe they are immune from cyber-attack

Do owners of small and medium-sized business ever considered the fact that they may at some stage face the prospect of cyber-attack? The chances are the answer to that question is no. The reason for this is that they feel they are not big enough, or important enough to warrant attention from hackers; after all, …

Read More

Nearly 100,000 travel insurance customer’s credit card details compromised in cyber-attack

2013 ended just as it had begun with yet another cyber-attack against a firm holding customer data. The personal and confidential information of thousands of Staysure customers was stolen by hackers. The cyber-attack saw the credit card details of nearly 100,000 travel insurance customers compromised. The travel insurance provider has revealed that card payment details …

Read More

NatWest online services hit by cyber-attack

If ever proof were needed that hacking is still an ongoing and persistent threat and that every business needs to beef up its defences against cyber-attack, then the experiences of Royal Bank of Scotland Group should serve as a salutary lesson for every organisation. Already unpopular for numerous well-documented reasons, RBS and Nat West took …

Read More

Payment Processor Hacking – 1,295 Bitcoins Stolen

BIPS, based in Copenhagen, one of Europe’s largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is believed that a two-stage attack was employed – DDoS followed by hack – was employed. BIPS primary service is to allow merchants to take payment in bitcoins, and then exchange them …

Read More

Cyber-attacks are becoming increasingly costly: can your business really afford not to protect against itself against such attacks?

Have you ever wondered why network security testing is so vital? Maybe you think that having already spent a considerable sum on security precautions to prevent hacking, the cost of additional vulnerability assessments and penetration testing is a step too far. Whilst Krypsys’ security experts understand such concerns, we still believe that it always pays …

Read More

Penetration testing helps with mobile security.

Penetration testing has been used to uncover vulnerabilities loitering in the mobile operating systems that are most commonly used today.

1.2 Billion Smartphones will enter the market in the next 5 years, that’s 40% of handsets. 75% of companies allow employees to use their own devises at work (BOYD) this is predicted to rise to 90% BY 2014. Is penetration testing being used enough?

Read More

George Orwell 1984 wrote about todays need for penetration testing

The need for penetration testing has become evident in today’s society as George Orwell depicted in his book 1984 relating to advances in technology.

In 1949, Eric Arthur Blair wrote a science fiction novel called “1984” under his pseudonym, George Orwell. The Science fiction novel presents a view of the world which is unnervingly realistic of today’s world. George Orwell foresaw advances in technology, the complete surveillance of society, the decomposition of history, and the limiting of freedoms. In today’s businesses advanced technology and data is persistently at risk of attack. Penetration testing is a necessity.

Read More