Multifactor Authentication (MFA)
Published: 09 November 2022 Last Updated: 11 November 2022
An authentication factor is something that is supplied to verify an identity – the most common example of an authentication factor is a password, a secret word used to authenticate yourself for access to an account. Multi-factor authentication is the requirement to supply several factors during authentication. This is often called “Two Factor Authentication” (2FA) as, most commonly, two factors are required, but it could, in some instances, be more and so MFA is the more general term.
Read More...Penetration Testing: Mix it up or stick with it?
Published: 02 November 2022 Last Updated: 03 November 2022
After publishing yesterday’s article about how frequently you should get a penetration test, I inadvertently started a discussion on Twitter about another aspect of penetration testing delivery: Should you change providers, or you should stick with who you know?
Read More...Small Business E-commerce: How do I prevent my site getting hacked?
Published: 02 November 2022 Last Updated: 04 November 2022
With modern platforms such as WordPress, WooCommerce, Magento, and Shopify, it’s now easier than ever to create an online store. However, many online retailers are not cybersecurity experts and might not be sure where to get started with securing their site.
Read More...Penetration Testing: how often should you test?
Published: 28 October 2022 Last Updated: 03 November 2022
The truth is, it’s very unlikely you’ll even get a strong answer from an organisation as to how frequently you should test. Even organisations like the NCSC, who offer guidance to UK businesses on how to stay secure, don’t give a direct answer to the question. However, they may comment on other businesses behaviour such as saying “it’s not uncommon for a year or more to elapse between penetration tests” before commenting that this is likely insufficient.
Read More...Selecting a PenTest Provider – Making a Good Decision
Published: 28 October 2022 Last Updated: 03 November 2022
Choosing a PenTesting provider can be difficult, how do you know if they’re good at what they do and they’ll make working together easy? Perhaps you have a provider already, but they’ve not lived up to your expectations.
Since choosing a testing provider is a critical part of your cybersecurity strategy, we’ve added a few things to consider here. We’re also available for advice and help if you’ve got questions about testing in general or how to get started with your strategy.
Read More...How Can I Turn PenTesting from a Cost into a Competitive Advantage?
Published: 27 October 2022 Last Updated: 03 November 2022
Turn Penetration Testing from a cost to a competitive advantage using customer retention, legal compliance and modern business practices in your favour.
Read More...Penetration Testing: how do you get the most from your budget?
Published: 27 October 2022 Last Updated: 03 November 2022
Tips and tricks to make the most of your penetration testing budget. We suggest practical ways to obtain the best value for your spend.
Read More...Controlled Chaos
Published: 10 March 2021 Last Updated: 03 November 2022
Major outages in major public cloud providers such as Azure and AWS are rare, but they do happen. Today OVH had a major incident: “OVH datacenter burns down knocking major sites offline” and they’re not the only ones to experience these issues, for example Amazon had a major outage in November and Microsoft had one in September.
This prompted me to write up an article on Akimbo’s recent work building resilience into our platform, so today I’m going to talk a little bit about a couple of the features of AWS that allow for significant resilience and I’m going to do that by running you through my recent experiments on our platform which can be roughly summarised as “Turning things off to see what breaks.”
Read More...