Phishing email cyber-attacks have to be the most common cyber-attack directed at any organisation. Most are trying to get the victim to reveal their credentials, often for Microsoft 365. Every week I spend time with clients discussing or investigating phishing emails and helping them put systems in place to help …
Yet another way for ransomware gangs to extort you
I have written about three of the ways ransomware hackers can extort you in my Ransomware Primer Mini-Series: Now the ALPHV/BlackCat ransomware gang has come up with yet another method to get organisations to pay their ransoms. In the US there is a legal obligation for publicly traded companies to …
Continue reading “Yet another way for ransomware gangs to extort you”
When someone writes code for you…
…do you get it checked? It may seem a strange thing to think about, surely the programmers know how to produce secure code? But recent research has shown that even the biggest organisations have coders who continuously leave valuable credentials embedded in their public facing apps. These transgressions often arise …
More patches and updates – That’s what Patch Tuesday does…
When Microsoft Patch Tuesday comes around other vendors take the opportunity and issue their patches as well. The US government’s Cybersecurity and Infrastructure Security Agency (CISA) is one of my go to places to check for vendor patches and security updates – here is what they have for the start …
Continue reading “More patches and updates – That’s what Patch Tuesday does…”
Microsoft Patch Tuesday – November Edition
It is the second Tuesday of the month that means this morning, our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. They will keep an eye on the reports all day to check there are …
Continue reading “Microsoft Patch Tuesday – November Edition”
