Blog

8 03, 2016

3 Reasons to Invest in IT Security during Recession

By |2022-05-04T09:56:31+02:00March 8th, 2016|Categories: guides|Comments Off on 3 Reasons to Invest in IT Security during Recession

Did you know that recession in the economy is fuelling and encouraging cyber crime across the world? Cybercrime is thriving in the era of cutback and layoffs, and has now surpassed illegal drug trafficking as a criminal moneymaker. Cybercrime covers a wide range of different threats, all involving computers and networks. The most common [...]

4 02, 2016

Put Your Phishing Knowledge to the Test

By |2022-05-04T09:56:49+02:00February 4th, 2016|Categories: guides|Comments Off on Put Your Phishing Knowledge to the Test

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

24 01, 2016

Understand the Difference between Phishing and Spear Phishing

By |2022-05-04T09:57:09+02:00January 24th, 2016|Categories: guides|Comments Off on Understand the Difference between Phishing and Spear Phishing

Social engineering and spear phishing are often the primary means by which attackers infiltrate modern corporate networks. While phishing attacks have been around for a long time, spear phishing is a newer type of attack. You may have heard both terms being used, but are you familiar with the difference between the two? [...]

16 01, 2016

5 Reasons to Phish your Employees

By |2022-05-04T09:57:29+02:00January 16th, 2016|Categories: guides|Comments Off on 5 Reasons to Phish your Employees

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

26 11, 2015

Encripto Celebrating 5 Year Anniversary

By |2016-11-06T16:40:09+02:00November 26th, 2015|Categories: news|Comments Off on Encripto Celebrating 5 Year Anniversary

Encripto is celebrating its 5th anniversary this month. The company was founded in November in 2010 by security expert Juan J. Güelfo and Ingrid C. Bentzen. Encripto was built to deliver IT security services with superior quality, and this philosophy is still important for everyone who works in our team. When Encripto was [...]

13 11, 2015

OWASP ASVS – Application Security Verification Levels

By |2016-11-06T16:40:12+02:00November 13th, 2015|Categories: guides|Comments Off on OWASP ASVS – Application Security Verification Levels

In this blog post we will have a look at the OWASP Application Security Verification Standard (ASVS) levels. OWASP ASVS is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, and even consumers to define what a secure application is. If you are not familiar [...]

6 11, 2015

Introduction to the OWASP Application Security Verification Standard (ASVS) 3.0

By |2017-01-31T19:48:39+02:00November 6th, 2015|Categories: guides|Comments Off on Introduction to the OWASP Application Security Verification Standard (ASVS) 3.0

Application Security Verification Standard (ASVS) is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, and even consumers to define what a secure application is.In October 2015 version 3.0 of the standard was released, and the requirements set to define a secure application have been [...]

25 10, 2015

How to Prepare for a Security Test

By |2023-05-05T13:10:18+02:00October 25th, 2015|Categories: guides|Comments Off on How to Prepare for a Security Test

A security test can provide your organzation with multiple benefits. For example, it will uncover if your security countermeasures actually resist external threats, and how well they respond in case of an attack. Computer attacks are a risk for all kinds of companies, no matter what size they have. If you follow this checklist [...]

18 10, 2015

NISK 2015 – Encripto presenting Keynote and Paper

By |2017-01-31T19:55:03+02:00October 18th, 2015|Categories: news|Comments Off on NISK 2015 – Encripto presenting Keynote and Paper

NIK, NOKOBIT and NISK are well established Norwegian academic conferences within different branches of computing and IT. United as a joint conference, they will be co-located in Aalesund 23-25 November 2015. Encripto will participate at NISK, both as a keynote speaker and presenting a technical paper. NISK is a specialized conference for information security, [...]

20 09, 2015

How to Choose Your Security Testing Provider

By |2023-05-05T13:14:20+02:00September 20th, 2015|Categories: guides|Comments Off on How to Choose Your Security Testing Provider

If you want to simulate a cyber attack and understand the consequences of vulnerabilities being exploited, you should perform a penetration test. Such a test will tell you whether it is possible to break into the company’s network and achieve specific goals. Make sure to check out the following list on how to choose [...]

Go to Top