<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/it-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/it-security/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Sat, 27 Sep 2025 08:43:04 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>IT Security Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/it-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Is the Real Motivation of Your Cyber Security Vendor?</title>
		<link>https://www.vertexcybersecurity.com.au/what-is-the-real-motivation-of-your-cyber-security-vendor/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-the-real-motivation-of-your-cyber-security-vendor</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 26 Sep 2025 08:29:31 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Client Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Partnership]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Managed Security Services]]></category>
		<category><![CDATA[Security Vendor]]></category>
		<category><![CDATA[Vendor Motivation]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9711</guid>

					<description><![CDATA[Discover the different motivations behind cyber security vendors. Is your partner focused on sales and billable hours, or are they truly dedicated to preventing you from getting hacked? Learn why choosing the right partner is critical for your business's security.]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing for Legacy Systems</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-for-legacy-systems/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-for-legacy-systems</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 03 Oct 2024 19:33:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Legacy Systems]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[vulnerability testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8752</guid>

					<description><![CDATA[Introduction Legacy systems are often the backbone of many organisations, providing critical services or running essential operations. However, as these systems age, they can become vulnerable to modern cyber threats. Penetration testing for legacy systems is a key method to protect older infrastructure from vulnerabilities that may not have existed when these systems were first [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Expert Cyber Security Specialist Vs. MSP &#8211; The Cyber Security Conundrum</title>
		<link>https://www.vertexcybersecurity.com.au/expert-cyber-security-specialist-vs-msp-the-cyber-security-conundrum/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=expert-cyber-security-specialist-vs-msp-the-cyber-security-conundrum</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 19:24:29 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Expertise]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Managed Service Provider]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Specialisation]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8394</guid>

					<description><![CDATA[Protecting your business from cyber threats is non-negotiable. However, choosing the right cyber security solution can be confusing. Should you engage an expert cyber security specialist or rely on a Managed Service Provider (MSP) who &#8220;also&#8221; offers cyber security? Let&#8217;s break down the key differences. The MSP Model: A Jack-of-All-Trades Approach MSPs provide a range [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The Legal and Ethical Considerations of Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/the-legal-and-ethical-considerations-of-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-legal-and-ethical-considerations-of-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 24 Jul 2024 06:36:33 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Ethical Issues]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Legal Issues]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8304</guid>

					<description><![CDATA[In the digital age, protecting sensitive data and maintaining robust cybersecurity is crucial. Penetration testing, or pen testing, has emerged as a key method to identify and fix vulnerabilities in a system. However, this practice involves several legal and ethical considerations that organisations must address. Understanding Penetration Testing Penetration testing, often called ethical hacking, involves [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to Prepare for a Penetration Test</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-prepare-for-a-penetration-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-prepare-for-a-penetration-test</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 26 Jun 2024 01:46:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8289</guid>

					<description><![CDATA[Introduction In today&#8217;s digital world, protecting your business from cyber threats is crucial. One way to assess your security measures is through a penetration test, or pen test. This involves ethical hackers attempting to breach your systems to identify vulnerabilities. Preparing for a penetration test is essential for ensuring accurate and useful results. Here, we [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing is so Important for Cybersecurity</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-is-so-important-for-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-is-so-important-for-cybersecurity</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 21 Jun 2024 16:29:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8287</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is more important than ever. With cyber threats constantly evolving, organisations must stay one step ahead. One of the most effective ways to do this is through penetration testing. Also known as pen testing, this proactive approach helps identify and fix vulnerabilities before attackers can exploit them. What is Penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing: The Basics</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-the-basics/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-the-basics</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 19 Jun 2024 08:45:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8283</guid>

					<description><![CDATA[In today&#8217;s digital age, safeguarding data and systems is crucial. One of the key practices in achieving this is penetration testing. Also known as ethical hacking or pen testing, this practice involves simulating cyber attacks on a system to identify vulnerabilities. In this blog, we will explore the essentials of pen testing, its importance, and [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>System Hardening in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/system-hardening-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=system-hardening-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 13 Jun 2024 19:35:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[System Hardening]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8264</guid>

					<description><![CDATA[In today&#8217;s digital age, cyber security is paramount. One critical aspect is system hardening in penetration testing. This process involves securing a system by reducing its surface of vulnerability. Here, we explore the importance, techniques, and benefits of network hardening. What is System Hardening? System hardening, also known as security hardening, network hardening or IT [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Third-Party Penetration Testing: The Essential Guide</title>
		<link>https://www.vertexcybersecurity.com.au/third-party-penetration-testing-the-essential-guide/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=third-party-penetration-testing-the-essential-guide</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Sun, 09 Jun 2024 08:45:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[third-party testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8260</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is more crucial than ever. Organisations must protect their networks and data from potential threats. One effective way to achieve this is through third-party penetration testing. This method involves hiring external experts to test your system&#8217;s security. What is Third-Party Penetration Testing? Third-party penetration testing, also known as external penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Insurance Testing in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/cyber-insurance-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-insurance-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 24 May 2024 03:54:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8181</guid>

					<description><![CDATA[The digital age brings immense opportunities for Aussie businesses, but also a rising tide of cyber threats. Cyber insurance has emerged as a crucial safety net, yet many organisations may be overestimating their protection. Companies must take proactive measures to safeguard their digital assets. One crucial strategy is penetration testing, which helps identify and address [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
