Cybersecurity Insights

Kirsty Trainer

Marketing Manager & Design-fiend at Foregenix

Recent Posts

Kirsty Trainer

Web Ninja partners with Foregenix to enhance website security!

12/05/20 10:00



CITY OF GOLD COAST, AUSTRALIA - Web Ninja has signed a partnership agreement with Foregenix, one of the world's leading cyber security firms, with the aim to make threat detection and protection available to all their eCommerce customers regardless of size and resources.

Read More
Kirsty Trainer

4 Reasons You Need File Integrity Monitoring (FIM) 

07/05/20 10:10

eCommerce environments are under constant threat from attackers; if your website touches cardholder data at any point, you’re a target. It doesn’t matter if you’re a big multinational conglomerate, or a tiny independent merchant; if you’re deploying poor security measures, they probably have you in their sights.

File integrity monitoring (FIM) systems are a critical part of your website's immune system. If you want to find and destroy malicious code, you’ll need to know where it is and where it’s come from. FIM systems will log changes made to your website, where they’ve come from and when they were made. Utilising a FIM log in your security strategy will help provide you with up to date knowledge of the inner workings of your website.

But why is file integrity monitoring important?

Read More
Kirsty Trainer

October is Cybersecurity Awareness Month!

08/10/19 11:38
As summer has now passed us by, we welcome October with open arms.

October is not only the celebration of Autumn and Halloween, it’s also Cybersecurity Awareness Month. This annual campaign aims to provide cyber awareness for all technology users.

Cybersecurity is the core of what we do, so we want to take time this month to help educate all internet users the importance of staying safe online.

In order to help raise awareness, we have compiled a list of Top Tips & FAQ’s  for staying safe online.
Read More
Kirsty Trainer

Top Questions To Ask Your Web Developer

04/09/19 11:49

Choosing a web developer can be a tricky task but ensuring you find the right one, who will maintain a secure (as well as beautiful) website, is key. We have compiled a list of top security-related questions you should ask your web developer to ensure they are going to protect your website.


Read More
Kirsty Trainer

The Potential Risks Of Exposed Admin Login Panels

06/08/19 11:00

Among many of our forensic clients we are noticing that fairly often the login panel for administration of the sites is left publicly and easily accessible, either through easy to guess URLs or unpatched vulnerabilities.

While this is not an immediate threat, an exposed and obvious administrative login panel can make it significantly easier for attackers to breach the site, especially if access controls are limited to username and password combinations alone. This situation allows for simple brute forcing, signing in with compromised credentials/obtaining credentials, or in the case of unpatched systems, access by exploiting vulnerabilities. Even in cases where the admin login panel URL is complex and hard to guess, path disclosure vulnerabilities can be used to locate it.

Read More

Kirsty Trainer

Marketing Manager & Design-fiend at Foregenix

Recent Posts

Kirsty Trainer

Web Ninja partners with Foregenix to enhance website security!

12/05/20 10:00



CITY OF GOLD COAST, AUSTRALIA - Web Ninja has signed a partnership agreement with Foregenix, one of the world's leading cyber security firms, with the aim to make threat detection and protection available to all their eCommerce customers regardless of size and resources.

Read More
Kirsty Trainer

4 Reasons You Need File Integrity Monitoring (FIM) 

07/05/20 10:10

eCommerce environments are under constant threat from attackers; if your website touches cardholder data at any point, you’re a target. It doesn’t matter if you’re a big multinational conglomerate, or a tiny independent merchant; if you’re deploying poor security measures, they probably have you in their sights.

File integrity monitoring (FIM) systems are a critical part of your website's immune system. If you want to find and destroy malicious code, you’ll need to know where it is and where it’s come from. FIM systems will log changes made to your website, where they’ve come from and when they were made. Utilising a FIM log in your security strategy will help provide you with up to date knowledge of the inner workings of your website.

But why is file integrity monitoring important?

Read More
Kirsty Trainer

October is Cybersecurity Awareness Month!

08/10/19 11:38
As summer has now passed us by, we welcome October with open arms.

October is not only the celebration of Autumn and Halloween, it’s also Cybersecurity Awareness Month. This annual campaign aims to provide cyber awareness for all technology users.

Cybersecurity is the core of what we do, so we want to take time this month to help educate all internet users the importance of staying safe online.

In order to help raise awareness, we have compiled a list of Top Tips & FAQ’s  for staying safe online.
Read More
Kirsty Trainer

Top Questions To Ask Your Web Developer

04/09/19 11:49

Choosing a web developer can be a tricky task but ensuring you find the right one, who will maintain a secure (as well as beautiful) website, is key. We have compiled a list of top security-related questions you should ask your web developer to ensure they are going to protect your website.


Read More
Kirsty Trainer

The Potential Risks Of Exposed Admin Login Panels

06/08/19 11:00

Among many of our forensic clients we are noticing that fairly often the login panel for administration of the sites is left publicly and easily accessible, either through easy to guess URLs or unpatched vulnerabilities.

While this is not an immediate threat, an exposed and obvious administrative login panel can make it significantly easier for attackers to breach the site, especially if access controls are limited to username and password combinations alone. This situation allows for simple brute forcing, signing in with compromised credentials/obtaining credentials, or in the case of unpatched systems, access by exploiting vulnerabilities. Even in cases where the admin login panel URL is complex and hard to guess, path disclosure vulnerabilities can be used to locate it.

Read More