My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Phishing network disrupted
Phishing attacks are repeatedly shown to be the number one cyber security risk for organisations in the UK – see the report linked below. So, anything that disrupts the threat actor’s ability to carry out and exploit these types of cyber-attacks is good news for everyone. Microsoft and the US …
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …
Encryption is important
I am an advocate of using encryption to improve the cyber security posture of our clients. This week I submitted a “draft for discussion” IT and Cyber Security Audit report to a client in which there are several recommendations to use encryption to improve their cyber security stance. Is encryption …
Microsoft Patch Tuesday – November 2024
Today is second Tuesday of the month, Microsoft Patch Tuesday. The day the cyber security world thinks about Microsoft patches and vulnerabilities. But remember other vendors also release cyber security and functionality updates and patches on or around the same time – check those as well. Cyber Security Highlights There are …
Continue reading “Microsoft Patch Tuesday – November 2024”
