Skip to content
Cynance
Cyber Security
Cynance
  • Services
    • Application Security
      • Penetration Testing
      • Secure Software Development Life Cycle (SSDLC)
    • Infrastructure Security
      • Network Security
      • Cloud Security
    • Offensive Security
      • Ethical Hacking
      • OSINT – Online Discovery
    • Security Risk and Compliance
      • Cybersecurity Risk Management
      • Privacy and Data Protection – GDPR
  • Industries
    • Online Gaming & Gambling
    • Tech Companies
    • Fintech
    • Startups
  • Insights
  • Company
  • Contact Us
  • Services
    • Application Security
      • Penetration Testing
      • Secure Software Development Life Cycle (SSDLC)
    • Infrastructure Security
      • Network Security
      • Cloud Security
    • Offensive Security
      • Ethical Hacking
      • OSINT – Online Discovery
    • Security Risk and Compliance
      • Cybersecurity Risk Management
      • Privacy and Data Protection – GDPR
  • Industries
    • Online Gaming & Gambling
    • Tech Companies
    • Fintech
    • Startups
  • Insights
  • Company
  • Contact Us

Category Archives: Articles

You are here:
  1. Home
  2. Category "Articles"

Secure passwords alone aren’t enough to protect your network security

Pa$$W0rD123: Why secure passwords alone aren’t enough to protect your network security

ArticlesBy Michal BauernfreundNovember 17, 2020

Almost every account we use on a day to day basis is protected by a password, but secure passwords alone are not enough to keep your networks safe.

Not for sale: Keep patients’ data safe from the stolen health data market

Health data protection: How to keep patients’ data safe from the stolen health data market

ArticlesBy Michal BauernfreundNovember 9, 2020

Stolen health data is extremely lucrative on the black market, and private health clinics are attractive targets for cyber criminals.

Essential Guide to Cybersecurity for Startups

Cybersecurity for Startups: Getting the Essentials Right

ArticlesBy Michal BauernfreundSeptember 21, 2020

Your startup is up and running, but how secure are you? Begin your cybersecrurity journey with our introduction to the essentials of cybersecurity for startups.

Identity theft

Identity theft. How the hell did it happen?

ArticlesBy Stav PischitsJune 22, 2020

Malicious actors use various techniques in order to obtain information from unsuspecting users, utilising successful identify theft attacks.

OSINT

OSINT: A guide to understanding and managing your OSINT footprint

ArticlesBy Stav PischitsJune 16, 2020

OSINT refers to information that can be freely and legally gathered from publicly available sources. As a company, you have to be aware of OSINT, and how you can use OSINT tools and techniques to protect yourself from risk.

GDPR

Happy 2nd bday GDPR! May You Always Stay Secure

ArticlesBy Stav PischitsMay 25, 2020

What you need to know about meeting GDPR information security requirements and how much it should cost you : Our quick practical guide.

Travelex - Learning the lessons from cybersecurity attacks

Travelex – Learning the lessons from cybersecurity attacks

ArticlesBy Nabha RoyJanuary 27, 2020

Over the past few years, most European companies have taken steps and made critical investments in response to the increased data protection compliance requirements, as part of which data inventory and mapping are a key milestone.

Website SEO Website SEO 100% 10 How to motivate your company to conduct a GDPR data mapping exercise Screen reader support enabled. How to motivate your company to conduct a GDPR data mapping exercise

How to motivate your company to conduct a GDPR data mapping exercise

ArticlesBy Nabha RoyAugust 20, 2019

Over the past few years, most European companies have taken steps and made critical investments in response to the increased data protection compliance requirements, as part of which data inventory and mapping are a key milestone.

Moving targets defense - Defenders' Race Condition

Moving Targets Defense – Defenders’ Race Condition

ArticlesBy Nabha RoyAugust 6, 2019

In computing, a race condition may occur when two or more threads access shared data and try to change it at the same time.

Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to detect Malware

Detection in the Dark – Exploiting XSS Vulnerability in C&C Panels to detect Malware

ArticlesBy Nabha RoyAugust 1, 2019

Over the past decade, numerous cyber attacks have made headlines, each attack more serious than the previous ones: larger in scope, greater in sophistication and more advanced in data exfiltration.

→12→

Cynance is a division of Transputec Ltd, with over 30 years of experience in IT consulting and services.

© 2022 Cynance. All rights reserved.

Services

  • Application Security
  • Infrastructure Security
  • Offensive Security
  • Security Risk and Compliance
  • Application Security
  • Infrastructure Security
  • Offensive Security
  • Security Risk and Compliance

Location & Contact Details

  • UK Head Office:
    Eton Ave, London NW3 3EU
  • contact@cynance.co
  • Privacy Policy
  • Cookie Policy

Stay Connected

Twitter Linkedin-in
Crest
Go to Top
By clicking ACCEPT ALL below you give us your consent for all cookies, ensuring you always experience the best website personalisation. Click ACCEPT NECESSARY COOKIES ONLY below to reject all cookies except Necessary Cookies. You can always modify your preference by clicking the COOKIE SETTINGS button and for more information please view our Cookie Policy.
ACCEPT ALL ACCEPT NECESSARY COOKIES ONLY COOKIE SETTINGS
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.

Grey sliders indicate cookies are inactive, Green sliders indicate cookies are active.

We value your privacy! You can provide consent of how your personal data is used by us through the cookie preference settings below, which can be changed at any time by visiting our "Cookie Settings".

Read more about our Cookie Policy and Privacy Policy.
Necessary Cookies
Always Enabled
These cookies are absolutely essential to provide proper functionality for our site and can’t be deactivated here. They will normally be set based on your use of our site for specific actions including: Setting your privacy preferences, login, form completion, adding products to a basket etc. Alternatively, they may be set as part of our fraud prevention and/or website security measures. These cookies can only be disabled by changing your browser preferences to warn you about or block these cookies, but in this case our site, or parts of it will not work.
Cookie Duration Description
_GRECAPTCHA 5 months 27 days This cookie is set by Google. In addition to certain standard Google cookies, reCAPTCHA sets a necessary cookie (_GRECAPTCHA) when executed for the purpose of providing its risk analysis.
cookielawinfo-checkbox-advertisement 1 year The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement".
cookielawinfo-checkbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional 11 months The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary 11 months This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
elementor never This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time.
viewed_cookie_policy 11 months The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Analytics Cookies
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie Duration Description
_ga 2 years This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
_gat_UA-176747747-1 1 minute This is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites.
_gid 1 day This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form.
CONSENT 16 years 5 months These cookies are set via embedded youtube-videos. They register anonymous statistical data on for example how many times the video is displayed and what settings are used for playback.No sensitive data is collected unless you log in to your google account, in that case your choices are linked with your account, for example if you click “like” on a video.
Advertisement Cookies
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customised ads.
Cookie Duration Description
IDE 1 year 24 days Used by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile.
test_cookie 15 minutes This cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE 5 months 27 days This cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.
YSC session This cookies is set by Youtube and is used to track the views of embedded videos.
Save & Accept
Powered by CookieYes Logo