Skip to content
Smart Thinking Solutions Cyber Essentials Certified

Smart Thinking Solutions

Cybersecurity Starts in the Boardroom

  • Home
  • Services
  • Contact Us
  • Clive Catton
  • Newsletters
  • Free eBook
  • Search

Author: Clive Catton

Clive Catton MSc (Cyber Security)

Clive is the CISO at Octagon Technology Ltd with special responsibility for data privacy and cybersecurity. The world of business technology is constantly changing and to meet this challenge he recently graduated from Edinburgh Napier University with an MSc in Advanced Computer Security and Digital Forensics - this course is certified by the Nation Cyber Security Centre. His dissertation was on data privacy and classification in small businesses using Microsoft 365 for Business.

The degree is not the end of the studying – to keep current Clive spends some of his time at work simply reading and studying the latest technology trends and threats so our clients can benefit from this knowledge. This knowledge also shapes and supports the products and services Octagon delivers to clients.

To make full use of Clive’s Master’s degree in cybersecurity, Clive and Diana have a joint venture with an international research company to get access for our clients to up to date information, schemas, analytics, templates, actionable tools and guidance. Whatever the size of your organisation if you are not approaching IT, cybersecurity and information privacy in a way that supports and benefits you, they can help, from the boardroom to the shop floor.

Clive and Diana are also working on a project to provide flexible online cyber security training for businesses at CyberAwake - Train Your Team To Protect You Against Cyber Attacks. Clive is the cybersecurity consultant for the project.

Clive has a long running personal blog at Clive's Blog. Here he publishes articles about photography, walking, camping, technology, stuff he just likes and since January 1, 2012, he posts "a photo a day" on the blog.
Posted on 30 March 202330 March 2023

Watch where you download your Tor browser from…

…or any other software. Governments around the world, including for instance Russia, ban Tor web sites from the internet in their countries as it is a very effective way for users to conceal their IP address from authorities. However this had led to a rise in other sites offering Tor …

Continue reading “Watch where you download your Tor browser from…”

Posted on 30 March 202330 March 2023

WiFi Frame leak research

Domien Schepers and Aanjhan Ranganathan of Northeastern University and Mathy Vanhoef of imec-DistriNet, KU Leuven, have published a paper demonstrating a flaw in the way WiFi access points handle power saving requests to and from devices. This could enable a threat actor to manipulate the WiFi frames passing between devices …

Continue reading “WiFi Frame leak research”

Posted on 29 March 202328 March 2023

I know why you cannot send email anymore…

…if you run your own onsite Exchange server. Keeping onsite Exchange servers up to date and patched was a labour intensive task, when our support team used to do it – now we no longer support any on premise Exchange servers it is a relief for the team. But for …

Continue reading “I know why you cannot send email anymore…”

Posted on 29 March 202315 December 2023

The Phishing Email – Just one click…

mouse click

This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …

Continue reading “The Phishing Email – Just one click…”

Posted on 28 March 202328 March 2023

Extortion Ransomware

I have a couple of articles over on CyberAwake looking at the issue of extortion ransomware and offering some tips for small and medium organisations on how to protect their information using tools they already have. From Encryption Ransomware To Extortion Ransomware Part I From Encryption Ransomware to Extortion Ransomware …

Continue reading “Extortion Ransomware”

Posts pagination

Previous page Page 1 … Page 181 Page 182 Page 183 … Page 514 Next page

Smart Thinking Solutions is a trading name of Octagon Technology Ltd. ©  2021 Octagon Technology Ltd

Smart Thinking Solutions supports Let's stop abuse together

Privacy Policy  Cookie Policy  1000 posts  Sign up to our Newsletter Proudly powered by WordPress
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
CONSENT16 years 3 months 3 days 14 hours 29 minutesYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
IDE1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSCsessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-idneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
cookielawinfo-checkbox-functional1 yearThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
SAVE & ACCEPT
Powered by CookieYes Logo