Call us today on: +44 (0)203 88 020 88
SecureTeamSecureTeamSecureTeamSecureTeam
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us

Blog

Home Articles posted by Ian Reynolds

Senior Penetration Tester

By Ian Reynolds | Jobs | 13 January, 2022 | 0

To help support our sustained growth, SecureTeam are currently on the lookout for an experienced cybersecurity consultant to join our  penetration testing team. We are a relatively small cybersecurity practice (based on the south coast of England), that genuinely strives to put our staff before profits. We pride ourselves in cultivating a friendly work environment,Read more

ISO 9001 and 27001 Certification

SecureTeam achieve ISO 9001 & 27001 accreditation

By Ian Reynolds | News | 27 March, 2020 | 0

We are very pleased to announce that we are now ISO 9001 & 27001 accredited. Achieving these accreditations as an organisation, allows us to demonstrate to our customers and partners that we place both quality assurance and information security at the forefront of our business and that we are commited to achieving a standard ofRead more

Messerschmitt GmbH – An Apology

By Ian Reynolds | News | 17 October, 2019 | 0

On 20th August 2019, we published a news article on our website that was intended to highlight a vulnerability which affected Messerschmitt “Mobile Key” door locks. At the time of writing, this article was written in good faith by us and was based on the previously-released research conducted by Chaos Computer Club that was presentedRead more

Reducing Your Data Breach Exposure

By Ian Reynolds | Articles | 22 November, 2018 | 0

We think that it’s well worth talking about GDPR in the context of the last twelve months worth of data breaches that we have seen in the UK and believe that GDPR may help reduce at least some of your exposure.  You may already know that GDPR gives you the right to request companies deleteRead more

android anubis malware

Anubis Malware Targets Android Devices

By Ian Reynolds | News, Vulnerabilities | 24 July, 2018 | 0

In the past couple of weeks a new malware infection has been doing the rounds which has affected thousands of Google Play Store users.  In early July it emerged that an organised cyber crime group infiltrated the Google Play store and uploaded a number of different apps containing the Anubis banking malware, which is aRead more

The Top 5 Cybersecurity Threats Affecting Small Businesses

By Ian Reynolds | Articles | 20 July, 2018 | 0

If you are responsible for managing the IT of a small business, then you probably already know that it’s a jungle out there, one with cybercriminals hiding behind every bush. According to the recent Verizon Data Breach Investigations Report, over the last two years small businesses have become the top targets of cybercriminals and areRead more

wpa3

What are the security improvements of WPA3 ?

By Ian Reynolds | Articles, Wireless Security | 7 July, 2018 | 0

The Wi-Fi Alliance (WFA) — the body responsible for creating the encryption standard used by billions of wireless Wi-Fi products worldwide — announced in January 2018 some significant improvements to its security protocol Wi-Fi Protected Access II (WPA2). In a much-anticipated move, the Wi-Fi Alliance also announced WPA3. The new protocol is designed to work alongsideRead more

SecureTeam are now a Cyber Essentials Certification Body

By Ian Reynolds | News | 21 June, 2018 | 0

We are pleased to announce that SecureTeam are now an accredited Certification Body under the UK government’s Cyber Essentials scheme. The Cyber Essentials scheme was set up in 2014 as a security initiative led by the UK government’s National Cyber Security Centre. The scheme provides businesses and organisations of all sizes to show their commitmentRead more

stay safe from phishing emails

10 Ways to Protect Yourself from Phishing Attacks

By Ian Reynolds | Articles, Social Engineering | 21 June, 2018 | 0

Email-based phishing attacks continue to soar at an all-time high. According to the State of the Phish™ Report 2018 by Wombat Security, it was reported that 76% of information security professionals had experienced phishing attacks against their organisations in 2017. As businesses and individuals, we continue to be plagued by phishing emails, which in someRead more

penetration testing under UK law

Penetration Testing Under UK Law

By Ian Reynolds | Articles | 17 April, 2018 | 5

When penetration testing is conducted within the UK, there are a number of laws that govern the activities that form part of a penetration test. For the majority of tests, these laws include the following: UK Computer Misuse Act 1990 UK Data Protection Act 1998 Human Rights Act 1998 Police and Justice Act 2006 InRead more

12

Recent Posts

  • HTML Phishing on the rise
  • Microsoft patches critical zero-day
  • NCSC offers free email security tool
  • Top 15 Most Exploited Vulnerabilities for 2021
  • NHS Targeted in Phishing Campaign

Tags

Adobe Android Apple blockchain Bluetooth Chrome Cisco credential stuffing cyber crime cyber essentials cyber security cyber security news Data Protection DDoS Dell DNS Exchange Server exim formjacking GDPR Google IoT Linux microsoft Mozilla ncsc npm patching penetration testing phishing ransomware RDP SAP security breach Security operations security testing SIEM software development Spectre supply chain attacks Sysinternals vulnerability management web applications web browsers wireless

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • July 2018
  • June 2018
  • April 2018
  • January 2018
  • October 2017
BCS Cyber Essentials Cyber Essentials Cyber Essentials PLUS ISO 9001 ISO 27001
information. secured.
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us
SecureTeam