HTTP vs. HTTPS: From the Outside, Looking In

This blog will cover the baseline for an understanding of HTTP and HTTPS. It will attempt to go as in-depth as possible, but I will most likely leave the more technical and complex things to our specialists as they will be able to explain in further detail. What is HTTP? HTTP (or Hyper Text Transfer […]

An FAQ for GDPR

What is GDPR? GDPR stands for General Data Protection Regulation. It gives offers more rights and freedoms to individuals living in the EU to control and access their data. There are 8 rights of the individual; these are: The right to be informed – Data subjects have the right to be informed about how their […]

Our Guide to Penetration Testing

What is Penetration Testing? Penetration testing — or pen testing — is a cybersecurity measure used to assess a range of digital systems, applications and networks. Imitating the movements of a hacker, a penetration tester will try to work their way around your system’s security. Penetration testing should be conducted in an ethical manner, keeping legitimate business security at the forefront. Do I […]

Cybersecurity: In-House or Outsourced

Choosing between in-house and outsourced cybersecurity is a big decision you must make as a business owner. There are pros and cons to either choice and it’s up to you to decide which makes more sense for you. What are the advantages of having a cybersecurity department in-house? Constant Monitoring – With your cybersecurity taken […]

Five Personality Traits of Hackers

Following on from last week’s article on black and white hat hackers, we found an interesting study on the personality traits of hackers. The research includes a grouping of personality indicators that was developed in the 80s and is still used today. The traits are as follows: Trait Sample Statement Agreeableness “I have a soft heart.” Conscientiousness “I am always […]

White and Black Hat Hackers: FAQ Answered by Our Hacking Team

White and black hat hackers are the good and evil of the hacking world. Black hats are those who hack their way into other peoples’ systems without permission and for their own gain, whereas white hats (such as Samurai) are ethical hackers that have permission to hack into systems and find the insecurities within their […]

FAQ on Phishing

After a bit of looking around, I managed to find some of the most frequently asked questions about phishing. Let’s see if we can’t clue some people in. What does phishing mean? By definition, it means; ‘the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, […]

Donald Trump’s Coronavirus Health Hack

Just in case you didn’t think that hackers will capitalise on literally anything to spread their malware, they’ve used Donald Trump’s diagnosis of Covid-19 to get people to open the gateways to their malware. Last Friday, US President Donald Trump tested positive for Coronavirus and had to spend time the weekend in hospital. So close […]

‘Will Cybersecurity Ever Die Out?’

When researching questions that are currently asked about cybersecurity, I came across ‘will cybersecurity ever die out?’ I found this question to be interesting as it’s a complex and rather odd question but, the more I think about it, the more interested I get so… Will Cybersecurity Ever Die Out? In short, no, and especially […]

Why is Cybersecurity Important?

Two popular questions by unseasoned cybersecurity researchers are ‘who does cybercrime affect’ and ‘why is cybersecurity important’? So, today, I’m going to walk you through the answers to these questions. Who does cybercrime affect? Cybercrime can affect anyone, whether you’re the attacker or an unfortunate victim. The more you do online, the more likely you […]