All the latest news, opinion and industry insight from the Commissum team.
09 Aug 18
Revenge by SAR of the Ex-Employee
Since the enforcement of the GDPR, Subject Access Requests (SARs) have increased as predicted, with many of these coming from ex-employees.
02 Aug 18
Ransomware – Still an issue in 2018 (updated)
According to Verizon’s 2018 Data Breach Investigations Report, Ransomware is still a major area of concern for cyber security. In fact, the report found Ransomware to be the most common form of Malware, accounting for 39% of Malware related incidents in 2017.
20 Jul 18
Press Release – Commissum welcomes onboard Senior Security Consultant Rob Horne
Rapidly expanding cyber security firm Commissum is delighted to be joined by Rob Horne, the consultancy practice latest hire.
18 Jul 18
Preparing for your Penetration Test
Get the most out of your next Penetration Test with these easy to follow preparation tips.
11 Jul 18
Security Patching. Err Yeah… Still Not Happening.
The latest instalment of Flexera’s annual vulnerability review has now been released. Read on to find out the big risks associated with desktop applications.
29 Jun 18
Security Implication for the Built- In User Group in Windows
This post explores the common security implication for Microsoft's Windows Operating System and offers steps to take to minimise these associated risks.
19 Jun 18
Here Come the Breaches
A commentary piece on the trend for data breaches over the coming months
15 Jun 18
Commissum Press Release – Commissum continues to grow its technical resources with the addition of new Senior Consultant Miguel Marques
Miguel Marques joins Commissum this month as a Senior Test Consultant, contributing to the company’s extended delivery capacity and reach.
06 Jun 18
Post GDPR: Remaining Compliant is a Continuous Journey
GDPR is an evolutionary process which require organisations to continue to identify and act on any privacy and security risks in the months and years to come beyond May 25th.
24 May 18
The History and Evolution of Social Engineering Attacks.
A commentary piece on the history and evolution of Social Engineering attacks