CyberAwake has published a follow-up article to my previous article on Cyber Security Culture. It looks at what you need to think about when it comes to the meetings following an incident: Cyber Security Incident Follow-up Meetings – (cyberawake.co.uk) How you approach these meeting can have a huge impact on …
Why you need be honest if you are hacked
This did happen in the United States, but it is a warning tale for all senior managers and board members – you are responsible. Ex-Uber security chief sentenced over covering up hack – BBC News Your Takeaway My Ransomware Primer includes sections on what your incident response plan should look …
Bank Scams Everywhere
Here is cyber security advice for your organisation and home. There is a marked increase of threat actors using bank scams, online, via phone calls, text messages and email. But we should have already been aware of these. The new trends are for attacks to come via social media, online …
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
WordPress plugin vulnerability
A vulnerable WordPress plugin is in the news. The Advanced Custom Fields plugin needs to be updated or your site is vulnerable: WordPress plugin flaw puts ‘millions of websites’ at risk • The Register If you use this get it updated now. Do you know if your website uses this …
