guides

23 11, 2020

Encripto’s 10th Anniversary

By |2020-11-27T10:06:52+02:00November 23rd, 2020|Categories: guides, news|Comments Off on Encripto’s 10th Anniversary

Encripto is celebrating its 10th anniversary on the 25th of November. The company was founded in 2010 by security expert Juan J. Güelfo. Since the beginning, Encripto has been a niche company specialized in information security, and we believe in a more secure IT-world. Success never comes in a day. It requires strong [...]

6 10, 2020

Why is Cyber Security Important? – Part 2

By |2022-05-04T09:47:13+02:00October 6th, 2020|Categories: guides|Comments Off on Why is Cyber Security Important? – Part 2

In our previous post, we covered what cyber security is and why it is important. Also, we gave you some tips to increase cyber security and reduce risk of cyber crime as a company. In this post, we will try to answer the next question: What can you do to improve your cyber [...]

28 09, 2020

Why is Cyber Security Important? – Part 1

By |2022-05-04T09:47:28+02:00September 28th, 2020|Categories: guides|Comments Off on Why is Cyber Security Important? – Part 1

Since 2010, National Security Month is celebrated in October in Norway. During this month, good security practices are promoted. In this blog post, we are going to have a look at what cyber security is and why it is important in our lives. Also, we will give you some tips to improve it. [...]

27 08, 2020

Why should you plan your security test?

By |2023-05-05T13:06:03+02:00August 27th, 2020|Categories: guides|Comments Off on Why should you plan your security test?

Security testing of any application or system is about searching for its potential weaknesses and vulnerabilities, which might result in a security breach. In this blog post, we are going to have a look at why and when you should plan your security test.Encripto delivers two main kinds of security tests:Application testing. Encripto has [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:58:18+02:00April 13th, 2018|Categories: guides|Comments Off on New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:35+02:00January 9th, 2018|Categories: guides|Comments Off on Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:11:37+02:00December 18th, 2017|Categories: guides|Comments Off on 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By |2021-05-21T13:20:55+02:00December 6th, 2017|Categories: guides|Comments Off on OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]

5 10, 2017

Best Practices – TLS / Transport Layer Protection

By |2017-10-05T17:51:58+02:00October 5th, 2017|Categories: guides|Comments Off on Best Practices – TLS / Transport Layer Protection

This blog post is based on OWASP Transport Layer Protection Cheat Sheet, and it will provide simple rules to follow when implementing transport layer protection for an application.Although the concept of TLS is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure [...]

24 08, 2017

10 Critical Security Areas That Software Developers Must Be Aware Of

By |2022-05-04T09:54:20+02:00August 24th, 2017|Categories: guides|Comments Off on 10 Critical Security Areas That Software Developers Must Be Aware Of

As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques.All tiers of a web application, the user interface, the business logic, the controller, the database code and more – all need to be developed with security in mind. [...]

Go to Top