Just launched today is our first cyber security ebook giveaway. Cyber Security Starts at the Top – Clive Catton MScTen Articles Exploring Your Cyber Security Responsibilities In this first ebook I have collected ten of Clive‘s longer articles which discuss a variety of cyber security threats and risks all organisations …
Unintentional data leak
Although this article looks at the image cropping security issue from the position of a whistle-blower, it could just as easily apply to a document you send out to a client or supplier or use internally. For example and image of pay scales across a company where you crop out …
CISA advises three exploited vulnerabilities
Although a US government agency the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog is a valuable resource for anyone responsible for cyber security. It reports on mainstream and less used software so that offbeat package you use could be reported on one day! They have released an …
Continue reading “CISA advises three exploited vulnerabilities”
ChatGPT – the fakes
Threat actors are always looking for the opportunity to abuse someone’s trust, exploit a tragedy or take advantage of something in the news, etc. etc. etc.. ChatGPT is in the news. Earlier this year, the popular artificial intelligence (AI) ChatGPT service started to charge for access and this has prompted …
Apple cyber security may have a flaw
I have written before on the steps Apple takes in improving the cyber security of its users, such as the “walled garden” app store to reduce app risk, supporting older devices with security updates and enforcing strict conditions on how apps operate on Apple devices. But they are a bit …
