
Tips on how to recover from a website hack
Last week I wrote about some of the indicators that will tell us if our website has been compromised. This week I want to give you an overview of what to do if you have been hacked.
Last week I wrote about some of the indicators that will tell us if our website has been compromised. This week I want to give you an overview of what to do if you have been hacked.
We must, and do, worry about the security of our web applications and our data. But don’t forget that a simple website can also be hacked. Often companies outsource their website development. This may be due to a lack of technical skills, or because they think it is a “marketing”
The Protection of Personal Information Act (POPIA) goes live on 1 July 2021. It places a huge burden on all organisations — from the one-person accountant firm to the big banks.
We’ve looked at many topics over the past few weeks. It’s easy to delay taking action by focusing on the concepts. And with so much information, it can be difficult to know where to start. So today I am giving you a list of four things that you can –
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at SAST, DAST and IASP.
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at Static Application Security
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. Last week we looked at Static Application Security Testing (SAST).
I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So for the next few weeks we’ll look at
I’ve been sharing ideas on how to build security into your development process. If you missed any of the previous articles, here are the links: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. Building Better Security – Part 3: Secure Design. This week I
In this series, we look at how to build security into your development process: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. This week I look at how we can include security during the design phase.
Stay home. Stay safe. Stay informed. Find information at www.sacoronavirus.co.za
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com