Home
Insightful &
Helpful Articles

Here is what we're working on and
thinking at Hedgehog security.

Honesty is the best policy when it comes to security

Honesty is the best policy when it comes to security

It has never been harder for businesses to build and preserve a relationship of trust with their customers. Increasingly sophisticated, and targeted, cyber-attacks means there are more threats to watch out for than ever before.


What is Penetration Testing

What is Penetration Testing

Pene tration testing is a method for evaluating the security of an information system by simulating the types of attack that are known to occur in the wild. The process can vary widely according to the requirements and purpose of the testing. Even the name given to this type of testing can vary widely.


What is Penetration Testing

What is Penetration Testing

Penetration testing is a method for evaluating the security of an information system by simulating the types of attack that are known to occur in the wild. 


Patching Humans

Patching Humans

In 2009, back when I was the Chief Information Security Officer for Ga la Coral Group, I wrote that one of the hot topics for many Chief Information Security Officers was reducing the potential for Data Loss.


Microsoft warn of critical Internet Explorer flaw   Updated

Microsoft warn of critical Internet Explorer flaw Updated

Patch released outside the normal monthly cycle! On Tuesday afternoon (August 18th), Microsoft took the unusual step of releasing a patch outside of their normal cycle of Windows updates on the second and fourth Tuesday of each calendar month. This can be taken as an indicator of the severity of the problem which has been discovered.


Ashley Madison revisited

Ashley Madison revisited

You may recall in a post last month I referred to the Ashley Madison ?hack? which had occurred a couple of weeks prior, at the end of June. At the time the intruders threatened to make public all the data they had exfiltrated, and I pointed out then that this would become a very useful source of secondary information for potential network intruders.


Alibaba and the password thieves

Alibaba and the password thieves

Revelations about a recent attack on China?s largest e-commerce marketplace serve as an important reminder to the rest of us.


Security Bulletin April'16

Security Bulletin April'16

This past month has been full of twists and turns in the cyber security sphere with the FBI dropping their case against apple, new high-tech USB malware and massive breaches at top law firms. As ever, we bring you our take on this months patches too.


Avoiding Online Scams

Avoiding Online Scams

Online Social engineering threats are commonplace these days and even the most experienced IT professionals fall victim to them. Online scams basically trick users into letting their computers become infected with viruses, or tricking them into revealing their personal information.


You could lose more than just Customers

You could lose more than just Customers

The demands of the public for more attention on the issue have found its way to the government and efforts towards resolving it are being made every day.