Cyber Security Blog

Keep up to date with Omni and cyber security news on our blog

external-internal-pen-test

External vs Internal Network Penetration Testing

Strong network security is a fundamental responsibility for all organisations and businesses. Weak cybersecurity can be extremely damaging to your company with severe brand and financial implications. External and internal network penetration testing is the solution to security testing and leads to … Read More

Featured Post
cyber-sec-business

What is vulnerability scanning?

Vulnerability scanning is one of the most critical responsibilities of an internal IT security team or a certified external security company. The consequences for a company that does not effectively manage vulnerabilities are severe. Vulnerabilities and weaknesses are an open … Read More

Featured Post
mitigating-malware

Mitigating Malware

Mitigating malware is about reducing the risk of infection by malware. Your organisation can take pre-emptive steps and prevent cybercrime. While it is impossible to defend 100% against malicious software, the risks are hugely reduced, when proper preparation and security … Read More

Featured Post
cyber-sec-business

Cybersecurity steps for your business

When planning and implementing practices for cybersecurity within your business, there are some things to consider. So, if you are looking for advice on cybersecurity and want to know where to start, read on. The main considerations for cybersecurity Your … Read More

Featured Post
5-reasons-cyber-essentials

Cyber Essentials – The Ultimate Guide

Ultimate Guide to Cyber Essentials Cyber attacks are becoming more, and more of a threat to individuals and businesses as criminals take their efforts online in their attempts to make money illegally. Whether it’s protecting the data of your employees, … Read More

Featured Post
security-operations-centre

What is a security operations centre (SOC)?

A security operations centre houses an information security team. The team is made up of both security engineers and analysts and oversee the security operation for an entire organisation. With responsibility for monitoring a company’s security stance, the team manages … Read More

Featured Post
lastpass-bug

LastPass patched a bug that could have made passwords available

In the last few days, LastPass, a popular password manager, has patched a bug that cybercriminals could have exploited. The vulnerability was discovered by staff at Google Project Zero and they highlighted that it could be used to steal user … Read More

Featured Post
iphone-security-flaw

iPhone security: How Apple devices were open to hacking for years according to Google

Google researchers revealed that they’d discovered hacker websites which targetted flaws in iPhones. This particular attach what could be one of the most significant cyberattacks on iPhone users ever. Motherboard – the tech team within the Vice website, reported the … Read More

Featured Post
ethical-hacking-penetration-testing

What is the difference between ethical hacking and penetration testing?

Ethical hacking and penetration testing are two distinct things, however, the terms are often used interchangeably. These terms differ in scope but both are geared towards helping corporations improve their cybersecurity and to minimise the risks of a successful cyber … Read More

Featured Post
downing street hack

Threesome dating app breaches Downing Street user credentials

It has come to light that a popular dating app, called 3fun, has been exploited to breach the credentials of users within Downing Street. 3fun connects its users so that they can arrange threesomes. More than 1.5 million users had … Read More

Featured Post