On Tuesday I wrote about how unsecured and unsupported Internet of Things (IoT) device on an organisation’s network can compromise their cyber security and how an IT and Cyber Security Audit can help identify these issues before they become an “incident”. Another aspect of poor cyber security of internet connected …
Over-sharing
I have many discussions with clients about this topic – over-sharing. Whether it is in their social media, on their website or even on the notice board in the reception area. These snippets of information that are readily available without “hacking” are called OSINT – open source intelligence. The Internet …
Redirected bank calls
FakeCall does exactly what it says. This Android malware can reroute your calls that you make to your bank, directly to the hackers. The obvious goal is to steal your private information and your money. Android malware “FakeCall” now reroutes bank calls to attackers If you are viewing this site …
Your BYOD Policy – What? (pt.5)
Are you still onboard with Bring-Your-Own-Device (BYOD) as a tool to improve your organisation’s productivity and help make your team “happier”? Then today, I am going to give you something harder to think about. BYOD and Your Information Allowing one of your team to work on their own laptop is …
Apple Updates
Microsoft’s Patch Tuesday is featured here every month – it is important part of everyone’s cyber security. Apple’s updates however are not always on a certain day but they are as important. All the current operating systems receive updates to patch a total of 67 vulnerabilities, with older operating systems …