Blog

Posts Tagged ‘defence’

It’s not a question of if you will be attacked, but when

February 6th, 2017 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, un-patched software, un-secure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

Criminals’ automated scans will find your presence online

January 26th, 2017 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

Threats are constantly evolving and changing

January 16th, 2017 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

You won’t even know that your defences have been successfully breached until it’s too late

January 6th, 2017 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

Threats are constantly evolving and changing

January 3rd, 2017 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, un-patched software, un-secure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

You won’t even know that your defences have been successfully breached until it’s too late

December 12th, 2016 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

It’s not a question of if you will be attacked, but when

December 5th, 2016 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

Threats are constantly evolving and changing

November 22nd, 2016 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

National Cyber Security Centre to shift UK to ‘active’ defence

September 19th, 2016 by Mark Daly in Industry News No Comments »
Share Button

The head of the UK’s new National Cyber Security Centre (NCSC) has detailed plans to move the UK to “active cyber-defence”, to better protect government networks and improve the UK’s overall security. The strategy update by NCSC chief exec Ciaran Martin comes just weeks before the new centre is due to open next month and […]

NEED MORE INFORMATION?Contact us to see how we can help your business

Call our Sales Team on: +44 (0)121 289 3434
or email us at: hello@ilicomm.com