I have not written about WordPress recently, but it is one of the most – if not the most – popular website package on the web so any issues with it or its plug-ins is news. Both professional web designers and less professional web designers use it. One of the …
The CIA Triad – Confidentiality, Integrity and Availability (pt. 1)
As part of this weeks summer cyber security webinar about encryption, I touched on the idea of how it can support the confidentiality, integrity and availability (CIA) of your information. In this article, we are going to expand on the CIA theme so you can see how encryption can help. …
Continue reading “The CIA Triad – Confidentiality, Integrity and Availability (pt. 1) “
Eight is not enough
It is a while since I have written about passwords – although I did do a deep dive into them and produced this Back-to-Basics primer: Most people would have got the message, by now, that a password has to be complex. The National Cyber Security Centre (NCSC) has an opinion …
WhatsApp security concerns
This ban is about cyber security concerns with using WhatsApp to conduct official US government business in the U.S. House of Representatives The House’s Chief Administrative Officer (CAO) has classified WhatsApp “as a “high-risk” communication platform” and suggests staff pick an alternative app such as Microsoft Teams or Signal. US …
An extra set of eyes – Remote Monitoring and Management
When it comes to cyber security it is always useful to have an ever vigilant monitoring system keeping an eye on the people and computers in your organisation. This is Remote Monitoring and Management (RMM) software – for a description of the advantage RMM will give your organisation have a …
Continue reading “An extra set of eyes – Remote Monitoring and Management”
