1. What’s the difference between a Vulnerability Scan and a Penetration test?

    Vulnerability scans, or vulnerability assessments are often confused with a Penetration test – but they are very different, and should be used in a very different way to assess and test your cyber security defences. Vulnerability scanning A vulnerability scan uses a suite of tools to provide a technical assessment of your IT estate, scanning […]

  2. GDPR – Essential information for IT security professionals

    With the forthcoming introduction of the EU’s General Data Protection Regulations (GDPR) in May 2018, there is now a definite move toward privacy by design, meaning organisations will have to build data security safeguards into processes – from beginning to end. Organisations will become accountable for the Personally Identifiable Information (PII) they hold; Know where it […]

  3. Petya ransomware attack spreads across Europe

    Firms worldwide, major government departments and government infrastructure have been hit by yet another ransomware attack, affecting many European countries, particularly the Ukraine, but also in the Netherlands and the UK, amongst others – (as of Tuesday 27th June) The Ukraine central bank, as well as Kiev airport and metro have been paralysed. Initial analysis […]

  4. Part 3: 5 Steps to Defend Against a Ransomware Attack

    In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences? Cyber crime is big business, often carried out on an industrial scale. While the financial implication of a ransomware attack varies, the business impact is unquestionably large. The […]

  5. Ransomware, part 2: The role of cloud sandboxing in ransomware protection

    In PART 2 of our 3-part series on Ransomware, we look at the role of Sandboxing in ransomware protection. Protection from attack requires a multi-layered approach, incorporating cloud sandboxing to block malicious traffic. What is cloud sandboxing? There can be no doubt that every organisation now requires advanced malware protection. Cloud sandboxing is a dynamic analysis technique designed […]

  6. Zscaler Cloud Sandbox – the best line of defence in evolving ransomware strains

    Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial delivery vector was not over HTTP/HTTPS, in this case. Still, multiple steps were taken to block payloads, avoiding post-infection activity for this Ransomware strain as it morphs. How Zscaler can help with preventative measures Firstly, make sure you have followed our guidance to protect yourself […]