guides

28 09, 2020

Why is Cyber Security Important? – Part 1

By |2022-05-04T09:47:36+02:00september 28th, 2020|Categories: guides|Kommentarer er skrudd av for Why is Cyber Security Important? – Part 1

Since 2010, National Security Month is celebrated in October in Norway. During this month, good security practices are promoted. In this blog post, we are going to have a look at what cyber security is and why it is important in our lives. Also, we will give you some tips to improve it.1. What [...]

27 08, 2020

Why should you plan your security test?

By |2023-05-05T13:07:36+02:00august 27th, 2020|Categories: guides|Kommentarer er skrudd av for Why should you plan your security test?

Security testing of any application or system is about searching for its potential weaknesses and vulnerabilities, which might result in a security breach. In this blog post, we are going to have a look at why and when you should plan your security test.Encripto delivers two main kinds of security tests:Application testing. Encripto has [...]

7 05, 2020

World Password Day

By |2022-05-04T09:48:14+02:00mai 7th, 2020|Categories: guides|Kommentarer er skrudd av for World Password Day

Every year on the first Thursday in May, World Password Day is celebrated and good password habits are promoted. Below we have compiled 5 tips to create stronger passwords and better protect your digital accounts against account hacking. Encripto hopes these tips are useful to you, and if you would like to know about [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:57:36+02:00april 13th, 2018|Categories: guides|Kommentarer er skrudd av for New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:31+02:00januar 9th, 2018|Categories: guides|Kommentarer er skrudd av for Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:13:35+02:00desember 18th, 2017|Categories: guides|Kommentarer er skrudd av for 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By |2021-05-21T13:22:14+02:00desember 6th, 2017|Categories: guides|Kommentarer er skrudd av for OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]

5 10, 2017

Best Practices – TLS / Transport Layer Protection

By |2019-02-20T16:05:43+02:00oktober 5th, 2017|Categories: guides|Kommentarer er skrudd av for Best Practices – TLS / Transport Layer Protection

This blog post is based on OWASP Transport Layer Protection Cheat Sheet, and it will provide simple rules to follow when implementing transport layer protection for an application.Although the concept of TLS is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure [...]

24 08, 2017

10 Critical Security Areas That Software Developers Must Be Aware Of

By |2022-05-04T09:54:27+02:00august 24th, 2017|Categories: guides|Kommentarer er skrudd av for 10 Critical Security Areas That Software Developers Must Be Aware Of

As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques.All tiers of a web application, the user interface, the business logic, the controller, the database code and more – all need to be developed with security in mind. [...]

20 03, 2017

4 Reasons Why Your Company Should Conduct Network Security Testing

By |2023-05-05T13:02:27+02:00mars 20th, 2017|Categories: guides|Kommentarer er skrudd av for 4 Reasons Why Your Company Should Conduct Network Security Testing

Cyber attacks are a risk for all businesses, regardless of size. Security testing will reveal if your company's security measures can withstand external threats, and whether they are adequate and functioning correctly.Effective network security testing simulates an attack from a malicious source, mapping the possibility of an attack and what consequences it can have [...]

Go to Top