WEBINAR: Web Browsers – Your New Security Perimeter

Protect On Q – Product Briefing & Demo – 17th July 2:30pm BST To attend, please complete the booking form at the bottom of this page The increase in web applications, cloud computing, SaaS and BYOD means web browsers have become the common interface for accessing information that drives business activity. Data loss from theft …

Read More

Risk management and intrusion protection: effective cyber security is good for business claims Minister

How vulnerable are British businesses to the risk of cyber-threat? How often are networks infiltrated by malicious intruders? The answer according to the government is that business are now more at risk than ever before, and they are encouraging businesses to take proactive steps to protect themselves against those who would exploit their vulnerabilities. Why has this suddenly become such a hot topic? Well, because research commissioned by the Government has revealed that 87 per cent of all UK SMEs and 93 per cent of firms with more than 250 staff had experienced at least one security breach in 2012.

Read More

Penetration testing; why is it so important for business?

In today’s climate of business insecurity it is becoming increasingly important for businesses to take every conceivable precaution to protect themselves and their assets from risk and breach. You only have to look in a newspaper or go online to read about the latest hack attack or security breach to realise that business are facing these dangers every day. Millions of pounds are being lost, and countless crucial data sets are being compromised. These security breaches can cause loss or significant damage to people, brands, reputation and profits.

Read More

What’s the difference between a vulnerability assessment and a penetration test?

What’s the difference between a vulnerability assessment and a penetration test? The answer to that question depends on who you choose to ask. For some people they are effectively one and the same thing; for others there are clear distinctions. So what’s the true position? Are vulnerability assessments and penetration test effectively two sides of the same coin, or are there clear differences between the two? The short answer is that whilst a penetration test may be a form of vulnerability assessment, a vulnerability assessment is definitely not a penetration test.

Read More

Network security( Penetration testing) : cyber-crime is costing the UK’s small businesses

It’s a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security. But just how much money is this failure to protect online networks costing small businesses? Well, according to Federation of Small Businesses it’s something in the region of £785 million every year. That staggering figure is the price SMEs pay when they fall victim to fraud and malware.

Read More

Security risk management: state-backed data spies hunt industrial secrets

If you ever doubted that security risk management was critical for businesses and enterprise, then your opinion might be changed after reading the information contained in the recent Verizon report. The latest study was published to coincide with Infosec – an annual security conference in London.

Read More

WEBINAR: Cost Effective Change Auditing

“How effective is your current approach to auditing and monitoring IT Changes?” Join us on 5th June, 2013 15:00 You would think most organisations would have a reliable trail of “who, what, where and when” changes are made to their IT Infrastructures but the reality is a majority simply don’t. Where would you say you …

Read More

There’s more to security risk management than just patching

With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. Vulnerability management systems are designed to address these issues. Vulnerability assessment is the process of identifying how vulnerable an infrastructure is to known vulnerabilities—the number one threat to all networks today. The threats/risks found in the vulnerability assessment are then ranked and prioritized to expose the current security position, and to facilitate the re-mediation process.

Read More

Security risk management: BYOD and the way forward

Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming a reality in many workplaces these days. Advances in technology have now made this possible. There’s no doubting that BOYD can deliver rewards and have positive impacts on productivity. However, these rewards can also involve risk. Although BYOD may be convenient for your employees, businesses will also need to consider its potential impact on corporate security models and data.

Read More

Extending the scope of your organisation’s Information Security Management System: information for organisations

The majority of organisations now generally have a number of information security controls in place. Whilst this is laudable, there is, unfortunately, still a problem which Krypsys sees on a recurring basis. Without a formal Information Security Management System (ISMS), these security controls have a tendency to be disorganized, haphazard or disjointed. The reason for this is simply down to the fact that the controls have usually been implemented partly as specific solutions for specific situations, or introduced as a matter of convention. The security controls in operation today, unfortunately, only typically address certain aspects of IT or data security, leaving non-IT information assets like paperwork and proprietary knowledge less protected and vulnerable. Sometimes business continuity planning and physical security might be managed independently of IT or information security, whilst Human Resources practices may not recognise the need to define and assign information security roles and responsibilities throughout the organization. The ISO/IEC 27001 standard was introduced to address these issues.

Read More

Categories ICM

Walking through Walls, 2013: protecting your business’ IT infrastructure from cyber-intrusion

Krypsys, a leading UK information security company which focuses on the next generation of emerging security threats in the Information and IT security market, is delighted to announce the launch of a series of free events: Walking through Walls 2013 – protecting your business’ IT infrastructure from cyber-intrusion. The Walking through Walls events promise to be of interest to any company or business that takes its information security seriously, and will highlight three common methods of attack used against companies every day somewhere in the world, and demonstrate and discuss the best methods of identifying and countering these threats.

Read More

Will vulnerability assessments and penetration testing find all the security vulnerabilities in your systems?

Will vulnerability assessments and penetration testing find all the security vulnerabilities in your network and systems? Well, the simple answer to that is probably not; that is, of course, unless you are prepared to spend an awful lot of time, effort and money on it. So why bother having your systems tested then? Well, because it is still vitally important to protect your network from vulnerabilities. What is required is closer co-operation between the client and the pen tester.  From a client’s perspective it’s about the importance of setting expectations and defining the requirements for penetration testing.  From a tester’s point of view it’s a question of gathering as much information as possible about the internal workings of the business and the systems to be able to do a comprehensive vulnerability assessment.

Read More

Walking Through Walls

Attend this FREE event and find out why your network firewall may not save you. You are invited to attend a Demonstration and Discussion on methods used to bypass your network firewall, followed by a light lunch and a Security Q&A Session in:- London Victoria | Tue 15th October 2013 | 11:00am – 1:00pm Hacking …

Read More

UK launches Fusion Cell to combat cyber-attacks

The UK government has launched a scheme designed to promote greater information sharing on cross-sector cyber threats between businesses and government. The Cyber Security Information Sharing Partnership (CISP) will establish a cyber-attack monitoring operations room, known as a Fusion Cell, where cyber security experts from industry will operate alongside the experts from GCHQ, MI5 and the police for the first time in an attempt to combat the growing online threat to Britain’s firms.

Read More