What is Penetration Testing?

In the world of information security, Penetration Testing is the practice of checking and testing the organization’s network, servers and services for possible loopholes and vulnerabilities, searching for vulnerabilities that an attacker may exploit.


Penetration tester are called white hats. They perform hacking in ethical ways, without causing any damage to the computer system, thereby increasing the security perimeter of your organization.


Penetration Testing is required because it helps you highlight the flaws related to hardware and software system design and operation, and quite importantly, personnel readiness. Early identification helps protect the network and if the vulnerabilities aren’t identified early, then they become an easy intrusion point for the attacker. Continue reading “What is Penetration Testing?”

Where to Start with Your Risk Management?

Understanding and identifying risks is essential to a well-built and sustainable business. Being in touch with the threats and the ways to counter them is essential for a safer working environment.


Risk Management is the most important instrument for Information Security Governance.  It provides a framework for assessment and successful management of risks. Sadly,  this is something  usually poorly done or even neglected completely by a surprisingly large number of organizations today. Risk management allows companies to devise and implement economically viable risk counter-measures. All activities involve risks, which are in turn a derivative of threats, vulnerabilities and impact. Properly identifying weaknesses and assessing the associated risks is essential, and pays off in the long run. Continue reading “Where to Start with Your Risk Management?”

The Role and Purpose of Training & Awareness in Information Security


Do not be alarmed to find out your organization is somewhere in the first couple of levels on the diagram below.  Awareness is the first step, and you have much to gain by just educating your personnel or just yourself.



Continue reading “The Role and Purpose of Training & Awareness in Information Security”

Team Development, Internal Audit & Control 101

The development of a company’s employees is of major importance. Ultimately progress and growth are what everyone’s after, but in order for that to happen, processes, workflow and ethnicity must be all under control.

In order to create a secure operations environment, an organization needs to build its structure and staff it in line with the proper approach to the human factor in Information Security. Failing to do so usually results in lack of direction, misplaced responsibility and ultimately, operational disruptions.


THE TOP-DOWN APPROACH – Information Security is never built from the bottom up. Do not assume that everyone in the organization is tuned-in to what (and how) needs to be done regarding Information Security. The major roles are usually defined as:


Senior Management – creates information security program and ensures proper and adequate staffing and funding and has organizational priority. It is responsible for ensuring organizational assets are protected.

Continue reading “Team Development, Internal Audit & Control 101”

Develop Policies for an All-round Approach to Information Security

Taking risks is something we do every single minute, sometimes without even realizing. A risk may be something as little as talking to somebody, let alone major decision making or something life defining. Taking risks alsorelates heavily to IT security, therefore a countermeasure is required – a policy.


Information Security Policies are an important administrative security control designed to avoid, counteract or minimize IT security risks. They are an integral and inseparable part of the multitude of possible security controls, without which one cannot claim for effective implementation of any meaningful security actions. Organizations need Security Policy, Standards and Procedures to enforce Information Security in a structured way.


Defining corporate security policies, basing them on industry standards, measuring compliance, and outsourced services are keys to successful policy management. Continue reading “Develop Policies for an All-round Approach to Information Security”