How vulnerable is your business website? Are you fully protected against cyber-criminals and hackers? Most of us would like to think we are, but the more you read the less certain you can be of that fact. Cyber criminals and hackers are sophisticated and will stop at nothing to get hold of your money or your business intelligence. Is the threat of hacking and cyber-attack an over-exaggeration? Well, Krypsys would argue not. In the course of the last week alone there have been news items about a 19 year old Argentinian hacker who was caught trying to steal millions of pounds from international money transfer and gambling websites, cyber criminals caught trying to steal millions of pounds from Santander and the personal information of more than 2 million customers was stolen from Vodaphone Germany.
Secure and optimise your web applications with Barracuda’s Application Delivery Controller
One question we’re often asked at Krypsys is what’s the difference between traditional load balancers and Application Delivery Controllers? Well, both products serve a similar purpose – to direct traffic to different servers based on availability and load. However, the best ADCs, like the one we recommend from Barracuda, go further; in fact they offer a number of competitive and cost-effective advantages over regular load balancers. Application Deliver Controllers are ideal for optimising application performance and availability. You could say that they are the heart and soul of modern day data centres.
What is ISO 27001 and why is it so important for organisations?
Generally speaking, most organisations and businesses will have some form of controls in place to manage information security. These controls are necessary as information is one of the most valuable assets that a business owns. However, the effectiveness of such a policy is determined by how well these controls are organised and monitored. Many organisations …
Top 10 Tips for Implementing ISO 22301
If you are serious about implementing a Business Continuity Management System that is compliant with ISO 22301, then you should consider the following Top 10 Tips:- Get commitment and support from your senior management. Engage the whole business with good internal communication. Compare existing business continuity management system with ISO 22301 requirements. Get feedback from …
How to Hack your System i
KRYPSYS will be presenting on iSeries security at International Power 2013 on 24th September at Bletchley Park How to hack your system i Hacking and information theft are now big business. The major threat to your systems and data is no longer from teenage amateurs. Organised, professional cyber criminals want to access your systems and …
Sony and hacking: proof that once bitten doesn’t necessarily mean twice shy
Sony issued a public apology to “Grand Theft Auto 5” developer Rockstar Games and to fans of the blockbuster video game franchise last weekend after copies of the game that were downloaded from the EU PlayStation Store were prematurely opened by hackers. Whilst the hackers were not able to get the entire game up and running, they did manage to extract critical audio and video files containing details about the “Grand Theft Auto 5” storyline and soundtrack. Naturally “GTA” fans were shocked to see details about the highly anticipated “Grand Theft Auto 5” begin to trickle across gaming forums late last week, especially those who had pre-ordered the game which is due for official release on September 17 on Xbox 360 and PlayStation 3.
Penetration testing helps with mobile security.
Penetration testing has been used to uncover vulnerabilities loitering in the mobile operating systems that are most commonly used today.
1.2 Billion Smartphones will enter the market in the next 5 years, that’s 40% of handsets. 75% of companies allow employees to use their own devises at work (BOYD) this is predicted to rise to 90% BY 2014. Is penetration testing being used enough?
ISO27001 Gap Analysis- Have you acknowledged all your cyber risks?
Ask yourself, have you acknowledged all your cyber risks? Do you have suitable information security controls in place?
ISO27001 Gap Analysis- Is your business looking to start the passage towards ISO 27001 certification? Krypsys can help with an independent verification of your Information Security Management System.
George Orwell 1984 wrote about todays need for penetration testing
The need for penetration testing has become evident in today’s society as George Orwell depicted in his book 1984 relating to advances in technology.
In 1949, Eric Arthur Blair wrote a science fiction novel called “1984” under his pseudonym, George Orwell. The Science fiction novel presents a view of the world which is unnervingly realistic of today’s world. George Orwell foresaw advances in technology, the complete surveillance of society, the decomposition of history, and the limiting of freedoms. In today’s businesses advanced technology and data is persistently at risk of attack. Penetration testing is a necessity.
Barracuda Application Deliver Controller security and storage solutions for “Big Data”
Big Data Explosion!
content>In today’s digital world, business enterprises need cost effective ways to guarantee security of the exploding volume of data that is being filtered through the internal network systems. “Big data” is no longer just confined to the realm of technology, today it is a business priority, and “Big data” has the ability to affect commerce in the global economy. Protecting this data with Barracuda application deliver controller, ADC can ensure it isn’t exploited and disseminated into the hands of the wrong people.
Barracuda- Application Deliver Controller, ADC
Business on the net is booming. The money traded on-line through web retail sites and internet services is still increasing exponentially. E-commerce companies, cloud service providers as well as hosing and data centre providers have a corresponding, growing need to provide better performance, higher availability and stronger security.
CISSP
The world we live in is now driven by the world-wide-web and the resulting speed of change makes it increasingly difficult to manage security at the same time as delivering business requirements. Here at Krypsys, our aim is to take away the headache by providing the right security skills and solutions, on-demand, when and where you need them.
Penetration testing: BBC demonstrates hackers can access web-cams
Hackers can actually look at you through your web-cam and listen to what’s going on in your workplace or even meetings. Are you aware of this? Penetration testing or “pen testing” is aimed at particularly identifying the points of reference where a hacker maybe accessing your infrastructure. A penetration test will start to identify with your systems weaknesses and omissions and using this information will penetrate deeper into your network to point the exact issues.
Cyber-security: Britain faces around 70 sophisticated cyber-attack operations per month against its government and industry networks
Just how serious is the threat of cyber-attack to the UK? Are our government and industrial secrets being targeted globally by cyber criminals? Most people have been lulled into something of a false sense of security. They are aware of the fact that governments and businesses take great care to protect their valuable assets and information, using intrusion protection and advanced penetration testing to filter out the threats, and that by and large such practices have managed to keep a lid on the problem.
Risk management: the UK Home Office launches a new £4 million information security awareness campaign
The UK Home Office has launched a new £4 million information security awareness campaign, designed to educate businesses and consumers about rising hacker threats and network vulnerabilities. The first stages of this new campaign will begin in the autumn, and will sit alongside other more-established information security initiatives like Get Safe Online, and form part of the broader government National Cyber Security Programme.