Category Archives: Threat Management

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

The Problem of Tailgating in Secured Buildings

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works … Continue reading

Posted in Building Management, Critical Infrastructure, Intrusion, Personnel Security, Physical Security, Security, Small Business Secure, Test, Threat Management | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve. Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, … Continue reading

Posted in Access Control, Business Integration, Cloud Computing, Critical Infrastructure, Fortify, Infrastructure Security, Intrusion, Network Security, public cloud, Resilience, SCADA, Security, Small Business Secure, Software (SAAS), Test, Threat Management | Leave a comment

An examination of DHCP Snooping with option 82 on Cisco.

DHCP snooping is a DHCP feature that provides security by filtering untrusted DHCP messages from hosts or other devices on the network. DHCP snooping accomplishes this level of security by building and maintaining a DHCP snooping binding table. An untrusted … Continue reading

Posted in Access Control, Cisco, Data, Home Security, Infrastructure Security, Intrusion, LAN, LAN Switching, Network Security, Physical Security, Security, Small Business Secure, Tech Tips, Threat Management | Leave a comment

Hackers hit ‘at least five oil and gas firms

A report compiled by security firm McAfee, has revealed that hackers have run rampant through the networks of at least five oil and gas firms for years. The hackers exploited weaknesses by means of a combination of con tricks, computer … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, SCADA, Security, Threat Management, Web Security | Leave a comment

Social Media sites and their “diverse” username policies

For most companies, protecting themselves online is a fairly straightforward exercise: Watch the internet for references to their name(s) or brand(s), and take action against those that may cause them harm. This process has been sufficient for years, resulting in … Continue reading

Posted in Critical Infrastructure, Test, Threat Management | Leave a comment