Cyber Security and Paper!

cyberawake

I have just published an article over on our online training site, CyberAwake, about how you start a cyber security review and then how paper becomes a significant step in that process: Where are the boundaries for your cyber security? – CyberAwake

If you have an HP computer, you had better read this article – and then take action

Read the article from Bleeping Computers or just jump to HPs page to see if your organisation is using one of the affected devices – but if you know you have an HO computer do something… Firmware bugs in many HP computer models left unfixed for over a year (bleepingcomputer.com) …

Log4shell – the vulnerability that is inside many software packages – just ask VMware – is here to stay

The SolarWinds attack, where the threat actors got inside SolarWinds’ systems and added their malicious code to a legitimate software update, so having SolarWinds distribute this malware to many of its high and low profile customers around the world, seems a long time ago now. But at least in this …