As part of an ongoing IT and Cyber Security Audit, I had several meetings this week to advise a client on how to migrate their current bespoke website to WordPress. These meetings included how to find a good WordPress developer and the standard of cyber security they should demand for …
Your BYOD Policy – Where do you start? (pt.4)
I discuss policies with clients a lot. This includes just asking to see them when I start an IT and Cyber Security Audit or when I am booked to deliver some Cyber Security Awareness Training. I am never surprised when they do not exist or possibly even worse, “not fit …
Continue reading “Your BYOD Policy – Where do you start? (pt.4)”
The end of the password as we know it…
…pssst. I have a secret. What’s the password? Passwords have been around forever. In the Bible the password was “shibboleth”, the Romans had “watchwords”, “tessera” is Latin for password and who could forget “Open Sesame”. In our connected, digital world we all depend on them and have depended on them …
Tricky Android Malware
It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
If you use WordPress then read on…
Automattic likes to tell us that it’s product WordPress is the world’s most popular website platform so it is dissapoibnting that a vulnerability has existed in it’s own popular plugin Jetpack since 2016. Jetpack fixes critical information disclosure flaw existing since 2016 (bleepingcomputer.com) How popular is Jetpack? As it offers …