Whenever Clive attends a marketing seminar he is often told about the advantages of using a QR to get his message out there. It is true that QR codes are very useful but of course threat actors exploit our trust of them: QR codes used in fake parking tickets, surveys …
Tackling Push Bombing
Multi-factor authentication stands between you and a threat actor gaining access to your services – but the attackers have come up with a simple way to subvert it. Just keep bombarding you with authentication requests until you either give in or make a mistake. If the hacker has your correct …
Business Continuity Planning
Following the pandemic, I thought everyone would have a written business continuity plan. Of course, I was proven wrong! Do You have a plan for the unexpected? Are you a business owner? If so, this is for you as having a business continuity plan is super important for a few …
Will Robots Rule the World?
Robots taking over? Clive is not sure but… A couple of weeks ago we were invited to speak to a Zoom meeting and this was basically a Question and Answer session. After reassuring the group that no question was too silly to ask, just that nobody had been brave enough …
Cyber Security Ebook Giveaway
Just launched today is our first cyber security ebook giveaway. Cyber Security Starts at the Top – Clive Catton MScTen Articles Exploring Your Cyber Security Responsibilities In this first ebook I have collected ten of Clive‘s longer articles which discuss a variety of cyber security threats and risks all organisations …
