13 May 2021
If you are intending to conduct a penetration testing exercise during the coming months it may be worth booking an hour with one of our consultants to undertake some initial planning to ensure you take the opportunity to get the scope of the testing right and maximise your budget allocation.
6 key points to consider about a Penetration Test:
Next month we will be making some important and exciting announcements regarding the conclusion of our development project and the availability of our new cloud-based IT Policy System and Policy Management as a Service offering. More details to follow.
Case studies
Two of our new policy customers, Wellington International Airport and Maitland City Council, kindly agreed to document a case study regarding their recent IT Policy System projects.
Click here to read their studies.
Policy work or a root canal procedure?
If you are struggling to develop, deliver and maintain the right level of IT Policies for your organisation you are not alone! - Drop us a note to arrange a discussion. An initial 15 minute walkthrough of our system provides clients with a good understanding of how we can assist them get this exercise in hand.
Some recent analysis by Tenable of 700+ breach events found that over 35% were caused by ransomware attacks, while 14.4% of breaches were the result of email compromises.
How is your organisation placed to deal with an incident? - even organisations that have invested in cybersecurity may still be unaware of how to prepare for and defend against a ransomware attack.
Do you have an actionable incident response plan? - and if yes - has it been operationalised? Click here to view details on our Incident Response Execution Pack
Our First Responder Forensic Toolkit (FRFT) is a cost effective kit that can be quickly deployed by customers in the event of an incident, as urgent action is usually required. If you are responsible for documenting and maintaining an incident response plan, then it may be worth scheduling a call with one of our consultants to discuss how the FRFT will allow you to quickly take control of an incident, and ideally manage it to a positive conclusion.
How does the FRFT assist you in the case of an incident?
The FRFT allows an organisation to perform in-depth forensic searches, collect evidence and complete 32 predefined key investigative tasks. Some common use examples being –
Finding a needle in a haystack
o They could be in breach of PCI-DSS requirements
o The data could be identified and used in the future by a hacker or rogue employee
The FRFT can be used to perform a search for card numbers used by 12 major credit card providers.
These common use examples provide a simple snapshot of the capabilities and power of the FRFT.
Click Here to view a detailed infographic we created on common use examples.