News

Managing Insider Threat

A lot of focus is placed on managing external threats by organisations, when in fact their biggest asset is also their biggest risk: People (Insider Threat). You can’t run a business without giving employees  access to resources, and you can’t give them that access without some degree of risk.  An insider threat is when a […]

Find out more

Managing Insider Threat

A lot of focus is placed on managing external threats by organisations, when in fact their biggest asset is also their biggest risk: People (Insider Threat). You can’t run a business without giving employees  access to resources, and you can’t give them that access without some degree of risk.  An insider threat is when a […]

Find out more

Load More

Cybercrime in the time of COVID-19

Updated 15th May 2020 Over the past few months we have been witnessing an increased amount of malicious attempts as many threat actors have started to abuse the panic and discomfort of the COVID-19 pandemic to conduct specially crafted cyber attacks. Our SOCs are continually seeing a significant spike in activity on Brute-Force attacks (authentication […]

Find out more

The Key Differences Between Vulnerability Scanning and Penetration Testing – as told by a penetration tester

The difference between penetration testing and vulnerability scanning is a widely discussed topic, however lately I have noticed that there are still numerous grey areas for the end users, and namely customers. One particular reason for this could be that technical language used in describing those type of assessments, may be clear to the security specialists, but […]

Find out more

Smarttech and IBM QRadar – Benefits of Managed SOC Services and Use Cases

At Smarttech we deliver managed SIEM (Security Information and Event Management) services to provide real-time analysis of your entire network system and a deeper visibility across your IT infrastructure through our Managed Security Operations Centre. The Smarttech security analysts manage and configure rules on the award winning IBM QRadar SIEM solution to fit the needs […]

Find out more

4 Tips To Fight Back Against Cyber Attacks

Fight Back Against Cyber Attacks Smarttech

High profile breaches make the main headlines every day globally. Advanced Persistent Threats and sophisticated cyber attacks are becoming more and more frequent. These days it is not a case of if companies get breached, but more of when.

Find out more

Find the holes before someone else does

penetration testing

Penetration testing is just as important for mid-market as enterprise. Penetration testing is the practice of testing a computer system, network or web application to find vulnerabilities that an attacker could exploit. Most network will will suffer from some level of misconfiguration, human mistakes, poor security policies and other vulnerabilities that can be exploited by an attacker.  To defeat […]

Find out more

Introduction To Penetration Testing

Every day we hear about successful high profile attacks that have been able to exploit vulnerability on a corporate network and extract valuable data. Whether this is in the form of credit card details, medical records or other personal information the question posed by IT managers remains the same: How can we ensure our perimeter/network […]

Find out more

Win 2003 EOL is rapidly approaching, is your Organisation Prepared?

Fail to prepare and prepare to fail as the old adage goes! On July 14th 2015, the reliable and much loved Windows 2003 Server is coming to its EOL. In the dynamic and fast paced world of IT, with cybercrime at its peak, a 12 year old system simply won’t do. To be fair it […]

Find out more

4 Reasons Companies Need Online Security Awareness Training

Given the fact that the cyber threat landscape has now more than ever been evolving so rapidly, have you ever considered implementing a security awareness training program to protect against malicious and financial attacks to your organisation? If you have, a online training program is the most efficient and easiest to implement. It is a great method […]

Find out more

The 2014 Cyber Attacks Timeline

Cyber security has been a major topic of discussion throughout 2014, with no signs of cyber attacks slowing down. Several organisations have faced high-end data breaches with millions of stolen credentials. Moreover, according to Arbor Networks research, in 2014 there were two times more DDoS attacks than in 2013. The start of a new year could […]

Find out more