Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2021

What is LDAP Server? How does it work?

The Lightweight Directory Access Protocol (LDAP) is a cross-platform vendor-neutral software protocol used for directory service authentication. For simplicity, imagine the LDAP server as a comprehensive virtual phone book. The phone book gives access to an extensive directory of contact information for hundreds of people. Using LDAP, it is easy to search through the phone book and find whatever information is needed.

How to manage and secure service accounts: Best practices

Service accounts can be privileged local user or domain user accounts or have domain administrative privileges. Service accounts best practice involves usage to execute applications and run automated services. A single service account can easily be referenced in many applications or processes. The critical nature of their usage and their use makes them challenging to manage.

LDAP vs Active Directory: What's the Difference

The main difference in LDAP vs Active Directory is that while both LDAP and Active Directory are used for querying user identity information, AD contains a complete network operating system with services such as DNS, DHCP etc. In contrast, LDAP does not have any of those functionalities. Understanding LDAP plays an essential part in getting to know your Active Directory better and preventing data breaches and unauthorised access.

Cyber Hygiene: Importance, Benefits and Best Practices

The internet and all of its conveniences have had a significant impact on how we do business. Our reliance on technology has never been greater, which means cyber hygiene is more important than ever before. In this blog post, we will talk about cyber hygiene, its benefits and why it’s so essential for businesses to practice it.

Cyber Security Incident Response Plan - How to Create One?

Cyberattack is one of the common threats that modern businesses are facing today. Despite the growing threat landscape of cybersecurity attacks, many small and medium companies that experience data breaches and threats do not have adequate preparations. This includes prevention measures before the attack and incident response plans during/after the attack.

Nuts and bolts of MITRE ATT&CK framework

To thrive in today’s cybersecurity landscape, learning the art of defence is essential, and layering this approach with Att&ck framework techniques has become a necessity. It means your organization needs to have a cybersecurity team to ensure that every aspect of your infrastructure is secured through processes, technical controls, and people.

Benefits of Cyber Essentials

Cybercriminals constantly target large organisations in the quest to exploit their networks, steal data and extort money. However, it’s well known that SMEs are also targeted with the same level of enthusiasm by cybercriminals. The reason is simple; an attack on a home user gives access to their email passwords which can then be used for social engineering, but an attack directly on a company can lead to the theft of intellectual property and sensitive strategic data.

Cyber Essentials Scheme: All you need to know

Cyber Essentials and Cyber Essentials Plus are government-backed accreditation for all businesses. It is a certification scheme that requires businesses to meet certain standards and measures to ensure that they are aware of the risks. Which risks? Well, something as simple as malware could affect your business if you don’t have the right controls in place.

Common Types of IT Security Risks: How to Prevent them?

Many different types of IT security risks can affect a business. It is essential to know about the implications, how cyber risks can be identified and what you need to protect against them. In this connected world, cyber attacks are a common occurrence. As long as the internet exists, there will be information security risks and malicious attacks that come with it. Ranging from minor nuisances to devastating consequences, hackers never seem to stop attacking your data!