The CREST (Council Registered Ethical Security Testers) OVS (OWASP Verification Standard) has been created to help standardise the way that advanced penetration tests are executed by creating a framework for all security consultancies to follow.
In the previous blog post, we discussed the importance of having a successful Incident Response Plan. In this blog post, we will go over the steps necessary to contain a breach. Containment is key to preventing the breach from spreading and affecting other parts of your business. By following these six steps, you can minimize the damage caused by a data breach and improve your chances of recovering quickly.
In our last blog post, we discussed the importance of having a solid Incident Response plan in place. In this blog post, we will discuss the next step in that process: identification. Once you have determined that an incident has occurred, it is important to identify the scope of the issue as quickly as possible. This will help you determine the best course of action and ensure that your response is effective.
Cybersecurity awareness is an increasingly hot topic, especially during this year’s Cyber Security Awareness Month. There are many things individuals and organisations can do to improve their awareness around security, helping to protect data confidentiality. In this blog post, we will discuss some essential tips for securing your data coming to the end of this important month.
In this blog post, we will discuss the first step in creating a successful IR plan: preparation. This step is crucial to an Incident Response Plan as this prepares your business to react when targeted by a cyber attack. This blog highlights the importance of the Preparation step and why its vital for businesses.
What is Phishing? You have most likely heard the term phishing thrown around social media recently, and no, people haven’t taken up a new hobby at the local lake. The first known mention of the term “phishing” stems from a program named AOHell designed in the 1990s.