OWASP Top Ten Web Application Risks

The team here at CyberWhite are going to put together a ten-part blog series on the globally recognised OWASP Top Ten list for web application security risks. This list is ordered in terms of prevalence, exploitability, detectability, and impact.  To begin this blog series, we will start by looking at A01:2021-Broken Access Control, moving up […]

Read More

Building a successful IT security awareness program

The first step towards creating a successful security awareness program is to recognise that this is not a project with a defined timeline and an expected completion date, but is instead a development of organisational culture. Akin to “safety first” cultures that develop in manufacturing and other heavy industries, there are large economic and regulatory […]

Read More

Do you really take information security seriously?

Do you take information security seriously? Of course, you do. We all do…don’t we? Well, there’s the thing. We all believe we take it seriously but how do we evaluate our success. Let’s just pause for a moment and think about this. In majority of businesses there is a focus on delivering a profit by […]

Read More

NCSAM and Children

At the risk of being a tech bore, you’re probably already aware from the press that October is National Cyber Security Awareness Month. Yes, it is a mouthful, but it is an issue that is critical to your family if you have young children and here’s why.   As parents raising children in these daunting digital times, each day technology, both its benefits […]

Read More

Improve Your Online Safety Practices With These Simple Tips

There’s no denying that the internet is a significant part of our lives, both personally and professionally.  Utilising the internet allows us to work, socialise and shop online. However, it is always prudent to protect ourselves and our organisiation as cybercriminals are also able to enjoy the same ease of access to the internet. Throughout October, CyberWhite are helping […]

Read More

5 Methods to Measure Your Security Awareness Program

Metrics don’t just paint a picture of the past; they provide a pathway to the future. Metrics, when used correctly can identify areas of training that require improvement and employees who need additional help. In addition to providing ROI for information security expenditures, metrics are instrumental in:   Identifying major data breaches and other vulnerabilities.   Attracting high-quality […]

Read More

Do Snapchat Pictures Really Disappear?

One of the most popular apps in social networking among the millennials is Snapchat. The most significant feature of Snapchat is its photo sharing, and that it disappears once the picture message sent. Apparently, the pictures are automatically deleted in 10 seconds once they have been viewed by the recipient. But do Snapchat pictures really disappear? Can they be removed entirely from the […]

Read More

Our approach to risk

Industry legend Bruce Schneier famously said that “More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk.” I can’t help but wonder if the comparison holds true in relation to some organisations’ approach to IT/Information security and the associated risks. After all, invariably many […]

Read More