Security blogs

How Hackers Can Take Down Critical Energy Systems Through The Internet?

Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected systems, especially through the integration of industrial internet of things (IIoT) technologies. This continuing [...]

2018-11-15T11:24:50+00:00 November 15th, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – IT Administrators

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-11-13T11:47:44+00:00 November 13th, 2018|Security blogs|0 Comments

600,000 breached company email credentials available on dark web

Latest News Recently it has been discovered that over 600,000 breached company email credentials from the UK’s leading construction, architecture and property firms are readily available on the dark web. Of the email credentials available, more than 450,000 of the breached credentials were from the UK’s leading construction firms. 110,000 were linked to top [...]

2018-11-01T15:25:31+00:00 November 1st, 2018|Blog, Security blogs|0 Comments

Threat Spotlight: Account Takeover Incidents Widespread for Phishing campaign

Account takeover incidents, where attackers steal the credentials of employees and use them to send emails from the user's real account, are increasing in frequency and magnitude.  In this Threat Spotlight, we take a closer look at the motives and demographics behind these attacks. Highlighted Threat:  Account Takeover – attackers attempt to steal [...]

2018-10-31T14:41:02+00:00 October 31st, 2018|Blog, Security blogs|0 Comments

The Human Factor In Cyber Security – Senior Management

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats. This series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across the organisation. [...]

2018-11-09T11:09:33+00:00 October 31st, 2018|Blog, CyberArk, Security blogs|0 Comments

The Human Factor In Cyber Security – New Users

About our Cyber Security Series of articles Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber security, are people and the risks they pose across [...]

2018-11-08T16:53:26+00:00 October 24th, 2018|Blog, Security blogs|0 Comments

How to Address Email Gaps in Office 365

The Email Features in Office 365 May Not Be All You Need... Businesses continue moving their productivity platforms to Microsoft Office 365™ in droves. As of their April 2018 earnings announcement, Microsoft said over 135 million business users worldwide are now on Office 365. While the move to the cloud represents potential savings for [...]

2018-10-08T09:07:47+00:00 October 5th, 2018|Security blogs|0 Comments

IT Security Vulnerability – Routers, Switches & Firewalls – Latest Blog Post

As part of our extensive penetration testing experience, MTI has identified the eight most common attack vectors found through regular testing. Every organisation today has an IT infrastructure of some kind that supports the operations of a company and processes its data, from basic internet-facing services, such as email and websites to segregated internal [...]

2018-10-05T09:19:38+00:00 October 3rd, 2018|Blog, Security blogs|0 Comments

IT Security Vulnerability – Web & Mail Servers

Almost every network with an Internet presence will expose some web servers and a mail server. Most vulnerabilities in a web server now stem from installed technologies that run on them, such as PHP, Tomcat and ASP.NET. As they are much more complex technologies and are user configurable, the scope to introduce a vulnerability [...]

2018-09-25T16:00:46+00:00 September 19th, 2018|Security blogs|0 Comments

Cyber Security – Where to Start?

The need for effective cyber security is felt, at board level and more widely, by organisations of all types and sizes. Despite the critical nature of the challenge, however, diverse failings are commonplace. Many organisations lack a comprehensive and coherent cyber security strategy. Governance, monitoring and user understanding are often weak, while an overly [...]

2018-08-14T08:19:35+00:00 August 3rd, 2018|Security blogs|0 Comments