Category Archives: Intrusion

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

The Problem of Tailgating in Secured Buildings

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works … Continue reading

Posted in Building Management, Critical Infrastructure, Intrusion, Personnel Security, Physical Security, Security, Small Business Secure, Test, Threat Management | Leave a comment

Energy Retrofits and Building Automation Save the Life and Expenses of a Building

The environmental impact buildings have in the UK is at alarming levels — accounting for 40% of the nation’s energy usage and an equal percentage of carbon output, and, when you consider water consumption, waste management and vehicle transportation for … Continue reading

Posted in Building Management, Critical Infrastructure, Failsafe, Fortify, Intrusion, Maintenance, Operation, Operational Efficiency, Physical Security, Power, SCADA | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve. Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, … Continue reading

Posted in Access Control, Business Integration, Cloud Computing, Critical Infrastructure, Fortify, Infrastructure Security, Intrusion, Network Security, public cloud, Resilience, SCADA, Security, Small Business Secure, Software (SAAS), Test, Threat Management | Leave a comment

An examination of DHCP Snooping with option 82 on Cisco.

DHCP snooping is a DHCP feature that provides security by filtering untrusted DHCP messages from hosts or other devices on the network. DHCP snooping accomplishes this level of security by building and maintaining a DHCP snooping binding table. An untrusted … Continue reading

Posted in Access Control, Cisco, Data, Home Security, Infrastructure Security, Intrusion, LAN, LAN Switching, Network Security, Physical Security, Security, Small Business Secure, Tech Tips, Threat Management | Leave a comment

Hackers hit ‘at least five oil and gas firms

A report compiled by security firm McAfee, has revealed that hackers have run rampant through the networks of at least five oil and gas firms for years. The hackers exploited weaknesses by means of a combination of con tricks, computer … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, SCADA, Security, Threat Management, Web Security | Leave a comment

Should I use and IDS/IPS? If so, what type?

Intrusion detection systems and intrusion prevention systems can be quite expensive. As such, a risk-based decision should be used to determine which system is best and where should it be located to provide the most cost-effective benefits. There are typically … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, Security, Test, Web Security | Leave a comment

Cloud Computing Used to Hack Wireless Passwords

German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses. Roth has created a program that runs on Amazon’s … Continue reading

Posted in Access Control, Cloud Computing, Cryptography, Fortify, Home Networking, Home Security, Intrusion, Network Security, public cloud, Security, Small Business, Small Business Secure, Software (SAAS), Test, Wireless LAN | Leave a comment