Category Archives for "Cyber Security"

What is Ethical Hacking?

cyber security and ethical hackers

When you hear the word “hacker” you often think of cyber criminals and bad guys with hoodies, or if you’re old enough the movie hackers. However, there is another bread of white hat “good guys” called ethical hackers. But what is ethical hacking? In short, it is the practice of simulating an attack against an organisation and identifying cyber security weaknesses with the companies permission.

By taking the same approach, ethical hacking tools and methodologies that a criminal hacker would, it’s possible for ethical hackers to bypass system security measures and compromise corporate networks. Ethical hackers are also commonly referred to as “white hat hackers” help organisations identify security issues then explain how to fix the discovered issues, ethical hacking ultimately helps and organisation improve their cyber security.

What is Ethical Hacking?

What is ethical hacking – ethical hackers commonly perform penetration testing to identify weak entry points into a network. In addition to discovering security issues and vulnerable software weaknesses, professional ethical hackers document findings, explain how to fix issues, and in some cases, provide consultancy on how to mitigate or perform remediation for cyber security threats. The work of a professional ethical hacker helps improve IT security policies, best practices and staff awareness to the cyber security issues that exist today.

How to become an Ethical Hacker

Ethical hacking ultimately requires the mindset of a hacker, the want to learn how things work, how things can be taken apart and finally, how things can be exploited to perform tasks that the original designer had not intended. Ultimately, your job will be breaking things, using them in a way to which the original designer had not intended them to be used. You’ll use this ability and passion to identify logic flaws, vulnerabilities and security issues within applications and infrastructure.

Professional Certifications

Industry level certifications can help show an employer you have what it takes to be a good ethical hacker. Certifications that offer hands on / practical elements such the OSCP, or the (CEH) credential prove you can perform ethical hacking against lab machines. In addition, they demonstrate a basic ability to document and report your findings in a professional capacity.

We hope this article has helped you understand more about ethical hacking, be sure to check out our other cyber security related articles.


What are Some Security Issues in Cloud Storage?

Nowadays, there are a lot of options when it comes to saving your files and making extra copies for safekeeping. These extra copies can be saved using other storage options besides hardware. Enter the cloud. The cloud is an excellent way to store files you need to back up without having to buy hardware which is subject to physical damage and corruption in the long run.

With the cloud, you can store files for free or through paid services, and you can access your files anywhere as long as you are connected to the Internet and you have a device to view the cloud service provider’s website or mobile application. It presents ease of access, an inexpensive storage option, and a way to reduce spending on external hard drives that may be lost or damaged.

However, there are some security issues in cloud storage which users need to be aware of. Usually, cloud service providers and services are easy and hassle-free to use, but there are times when users will meet some challenges while using cloud storage services. Here are some security issues in cloud storage that you should be prepared for:

  • Hacking threats – Today, there are a lot of malicious third parties who get in the otherwise harmonious relationships that cloud service providers and cloud users have. Just recently, thousands of photos from private accounts were leaked, and once they were out on the web, they became subject to the eyes of thousands—even millions—of curious people. Cloud service providers usually secure their databases and servers, but there are still times when hackers can get the upper hand.
  • Lost files – In relation to hacking threats, there are also times when files can be lost. Hackers don’t always just expose files; some can steal the files or delete them completely. This is a particularly troublesome thing to deal with especially when the files you’ve saved online are work-related. Because of this, it is still important to have secure copies of files in reliable hardware options. If you can, go for cloud services that are paid and offer additional layers of security to avoid file loss.
  • Account recovery – This may seem like a nonsensical problem but there are times when account recovery can actually become a problem. Especially when the security measures of the cloud service provider are tight, recovering your account which may have been logged out or not used for a while leading to inactivity can be a lot challenging. Sometimes, users rely on “remember” me features in their computers or devices to access their online cloud storage accounts. But what if they forget their login details and they need the files? This is where the hassle begins. The process can usually be resolved quickly, but for really secure cloud service providers, more details may be required from the users to prove their identity and claim over the account.

Have you ever had security issues with your chosen cloud storage service provider? Can you tell us how you handled those issues?