Security Event Logging, why it is so important

Every once in awhile I get asked why detailed event logging is so important when setting up cybersecurity controls at a business. In this article will attempt to explain why this is critically important. To log or not to log, that is question… When it comes to logging security events and being able to make[…]

How much should you spend on an external PenTest?

External Penetration Tests today come in all shapes and sizes, from the rudimentary highly automated scanning to the more detailed and human-driven PenTests, with often widely ranging costs to boot (3 to 4 times difference is not unusual for essentially the same thing). Sometimes it’s difficult to work out what form of external PenTest is[…]

Online Security

Having an independent assessment of your online security can highlight security weaknesses. At Aykira we have the expertise to conduct in-depth security audits that you can use to harden your systems and reduce your business risks. We also have the skills base to remediate problems found. We consider it very important that your systems be[…]