Performanta Services is characterised by a history of demonstrable successful implementations and optimised solutions across 5 Continents with a reach of over 1.2 million users.
Performanta Technologies invests in cutting-edge IT security technology to give our customers the edge in understanding the threats encountered across their security landscape.
No one is safe from getting hacked. This has been no more evident than in 2014 where we have seen some of the biggest high-end data breaches of large companies ever seen to date. Data, personal records and financial information has been stolen and sold on the black market in a matter of days. eBay, Target and more recently Sony … Read the restRead More
Everyone is at risk of being hacked, in fact, the last few years have seen some of the biggest high-end data breaches of large companies to date. The trend signifies a large increase in attacks from ‘trusted insiders’ or threat actors, aided by the increased availability of underground offensive security technology. Malicious actors can now utilise attack toolkits of sorts … Read the restRead More
The cyber-security challenge within the UK is dual-faceted – not only are the amount of attacks increasing, we are also facing a cyber skills shortage where the time to hire new employees is regularly upwards of 6 months and in many cases a potential employee with the required skills doesn’t exist to hire. The 2015 Global Cybersecurity … Read the restRead More
Whether you’re the chief information security office (CISO) of a major corporation managing security technologies or leading a security team, you’re most likely very familiar with the objectives of your role. Protecting the company’s assets and ensuring its productivity. You are the wall that stands between the organisation and the adversary, whether it’s protecting from an external attacker that attempts … Read the restRead More
A few days ago, our team had to respond to a worm outbreak in one of our customer sites. The threat name was Sality which is a well known worm that started propagating back in 2003. The Sality worm spreads by infecting legitimate executable files and copying itself to a different location on the local system and on network shares. … Read the restRead More
Originally posted by Help Net Security
In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into place, not just for EU companies but all companies who deal with EU consumer data. This is echoed in the UK, where the government has rated cyber … Read the restRead More
Last year, the Government’s Security Breaches Survey found that 81 per cent of large companies had reported some form of security breach, costing each organisation on average between £600,000 and £1.5 million.
The reality is that the number of cyber security threats is continuously on the rise. The increase in basic and complex attacks on businesses is driven, in part, … Read the restRead More