IT Security News & Blog

5 Things You Didn't Know About Network Monitoring Solutions
27 July 2018
Network monitoring solutions and SNMP (Simple Network Management Protocol) have been around for over twenty years; and has become a staple of many a network. With age comes a scepticism about how innovative such solutions can be; and whether or not they are commoditised, with literally hundreds of vendors offering such tools....
Using IFTTT to Monitor Servers and Network Devices
26 July 2018
Being a bit of a technology philistine at home, I was only recently enlightened to the joys of IFTTT technology and how it is powering home automation and other integrations. I have to admit, as much as I prefer to leave IT to my day job, I was intrigued at the possibilities it could open up; and even more so, how this could benefit organisations....
5 GDPR Modules Added to Innovative Training Solution OutThink
26 July 2018
In bringing your workforce up to speed to ensure compliance with GDPR, you’ll require top quality information security and data privacy training content. The OutThink learning material is developed by industry experts working alongside education professionals, human-computer interaction specialists, psychologists, as well as behavioural change and communication experts....
What is Netflow and Why Do Network Admins Swear By It?
24 July 2018
The level or knowledge or even awareness of netflow is a mixed bag, in my experiences speaking with IT managers and network engineers. Those who have attended accredited courses for network equipment or those networking veterans will be very familiar with the technology. For others, it is a new and exciting technology which can reveal a vast wealth of insight into network traffic....
Extending Network Monitoring to AWS and Azure
21 July 2018
These days it seems that it is almost impossible to find an organisation who is not either using cloud infrastructure services, such as AWS (Amazon Web Services) or Microsoft Azure, or at least experimenting with them. The benefits are attractive, lower operating costs, better resilience and rapid deployment times are just a few....
What is SNMP and is it Secure?
20 July 2018
Whether it be SNMP traps or community strings, there is a very good chance you have heard of this veteran network monitoring protocol at some point in your career. With well over twenty years of existence, the simple network monitoring protocol has provided us with just that, basic insight into the health of network devices, servers and software....
10 Reasons why Network Monitoring Software is a Must Have
18 July 2018
Network monitoring software and solutions are nothing new, starting their humble beginnings with SNMP (Simple Network Monitoring Protocol) in the 1980s. Since then things have progressed to include easier to use protocols for monitoring such as WMI and syslog; as well as SNMP being upgraded to include authentication in version 3....
How to Automate File Transfers and Ditch the Scripts
16 July 2018
After eight years of working with managed file transfer solutions (MFT), there is one use case which pops up time and time again....
Tripwire Enterprise and NNT Change Tracker (Who Would Win in a Fight?)
13 July 2018
When it comes to FIM (File Integrity Monitoring) and secure configuration management. there are two main solution vendors worth considering. Tripwire Enterprise and NNT Change Tracker. Both have impressive existing customer rosters and reputations; are multi-million pound businesses and have an international presence. But which solution is better?...
5 Reasons to Consider Managed File Transfer in the Cloud
11 July 2018
Storing sensitive files and personal data in the cloud can be a touchy topic for some, keeping even the most seasoned information security leader or data protection officer awake at night. Although, despite what the humble salmon teaches us about swimming against the tide, it is hard to fight against the unstoppable trend towards cloud adoption....
OutThink is Recognised by GCHQ and HMG as the Leader in Cybersecurity Training
10 July 2018
Pioneers in cybersecurity culture and cognitive training solution vendor OutThink Threats has been awarded by GCHQ (Government Communications Headquarters) as a preferred supplier to government departments in the UK....
ENISA's 8 Step Plan for Building a Risk Aware Cybersecurity Culture
9 July 2018
There is almost universal recognition that traditional security awareness raising campaigns, such as those which leverage legacy CBT and phishing simulations are not, in themselves, affording sufficient protection against cyber attacks....
How to Simplify GDPR with a Dynamic Privacy Policy
6 July 2018
The GDPR (General Data Protection Regulation) is a difficult beast, with some estimates as low as 15% for the number of organisations who considered themselves GDPR ready by May 25th 2018. Not a surprise then considering the debacle that was re-consent email deluge and the "we have changed our privacy policy" communications that flooded everyone's inbox....
What is the Difference Between FTP and Managed File Transfer?
5 July 2018
It may be obvious to some that FTP (File Transfer Protocol) is an insecure protocol; and that its continued use for transferring sensitive or personal is inappropriate. Yet, its use for that very purpose still continues according to Rapid7, creating an unnecessary risk....
What is the UK's New Minimum Cyber Security Standard?
30 June 2018
This week has seen the release of a new baseline of mandatory cyber security requirements for UK government departments. Known as the Minimum Cyber Security Standard, it creates a minimum set of measures which all government departments will need to adhere to, although the hope is that as a baseline, they will in fact seek to exceed these at all times....
5 Benefits when Using Secure Email and Attachment Solutions
25 June 2018
Do you send sensitive documents and files using regular email? Could you do more to protect those documents and files to ensure their confidentiality? These are just two of the more obvious questions which many an IT administrator and security officer are now asking their organisations, as the world and it's regulators become more focussed and stringent on data protection....
7 Key GDPR Questions & Considerations for Ongoing Operational Success
11 June 2018
Now that the General Data Protection Regulation (GDPR) is live and enforced, the focus has shifted from how to comply with how to maintain the controls and processes which have been implemented. While this may just seem like a continuation of what has been achieved already, it is in actual fact a moment to improve. Those processes and changes which were rushed or not properly embedded into day-to-day operations will now need to be cultivated amongst staff for the long haul....
7 Considerations for GDPR Subject Access Requests
10 June 2018
Is the board listening? We all know that GDPR will be enforced from 25th May 2018, but is your board aware of their new privacy obligations? While there is substantial GDPR coverage in the technical press, has the message got through to senior management?  Are their preparations adequate?...
How to Create a PCI DSS 3.2.1 Compliant MFT Solution
8 June 2018
As of May 2018, payment merchants and other credit card handling organisations will need to have familiarised themselves and have implemented the latest iteration of the PCI-DSS (Payment Card Industry - Data Security Standard). Version 3.2.1 expands on what is already a comprehensive and well-known standard by adapting to the rapidly changing climate of data protection, privacy and vulnerability management....
What is File Integrity Monitoring and How Does it Work?
7 June 2018
FIM or File Integrity Monitoring, is without a doubt a highly important layer of defence in any network worth protecting. Required by data security standards such as PCI-DSS and recommended by auditors and security practitioners globally. FIM monitors critical system files, operating system components and even network devices for unauthorised changes....
Is Your MFT Solution Ready for PCI-DSS Ending Acceptance of SSL / Early TLS?
6 June 2018
As of the 30th of June 2018, the use of SSL/early TLS in PCI-DSS (Payment Card Industry Data Security Standard) card environments will no longer be accepted as a compliant protocols by the PCI security standards council and thus could render your accreditation as invalid. What does this mean for you and your managed file transfer solution?...
5 Ways an MFT Solution Can Help You Look Like a GDPR Genius
5 June 2018
The GDPR (General Data Protection Regulation) has for some, fundamentally changed the way that businesses operate, with regard to the collection, processing and transferring of personal data. What is often referred to as the world's most forward-thinking data protection regulation, has forced data controllers to ensure basic levels of security are in-place in order to reduce the risk of loss, disclosure, unauthorised processing, deletion or manipulation....
Achieving PCI-DSS with File Integrity Monitoring
4 June 2018
Has there ever been a more confusing data security standard than the PCI-DSS? Even now, thirteen years on from its initial release, a clear understanding of what you need to achieve to be compliant may still be a challenge....
How to Eliminate FIM Change Noise Once and For All
3 June 2018
For some, a FIM (File Integrity Monitoring) solution is a compliance necessity, for others it features as a core component of their change management process. In either case, file integrity monitoring provides a mechanism for alerting when applications, system files or configurations change unexpectedly....
The 10 Minute Guide to Managed File Transfer (KISS Approved)
2 June 2018
Irrespective of which industry your organisation belongs to, facilitating collaboration and the sharing of files and documents among your employees, customers and business partners is a key requirement for increasing your revenue generation potential. Effective collaboration with employees, customers and business partners means that at some point, files and documents will need to leave the security and boundary of your organisation....
Ipswitch MOVEit Managed File Transfer "Ticks All the Boxes" for Systematic
1 June 2018
IT solutions provider Systematic have chosen Ipswitch MOVEit Transfer as their MFT (Managed File Transfer) solution, describing the offering as "ticking all the boxes" after evaluating other competing solutions against GDPR and ITAR requirements.....
Advanced Cyber Solutions is Announced as Ipswitch Partner of the Year
12 May 2018
Advanced Cyber Solutions, have been awarded the Ipswitch Partner of the Year for Northern Europe, in recognition of their unrivalled service in the region. "From pre-sales all the way through to post-sale, Advanced Cyber Solutions are trained and accredited to help their prospects and customers. From day one of signing with Ipswitch, the team have been committed in gaining both technical, sales and training certifications available, ensuring they have access to the resources Ipswitch engineers use internally." - Matt Scotney-Jones, Ipswitch Regional Channel Manager for Northern Europe....