Microsoft’s Outlook.com email service has been and is suffering a series of outages that is impacting it’s users. This is not a common service used by business, however we do have some clients, who have a need to use this type of service ( I am not sure if they …
What is the Insider Threat?
I could get a dictionary definition here – but instead I will simply say it is a trusted employee betraying that trust and revealing your information to an unauthorised party. Most of us would immediately think people in high positions of trust selling high value information to your competitors and …
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
Supply chain vulnerability
We have many clients who have their own software or have custom software on their website or web apps written for them by developers. These developers may or may not reuse code or modules written by third party developers and sourced through a software repository – such as GitHub or …
Five simple steps
This is an excellent article by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management at Microsoft looking at five simple steps any organisation should consider making to improve their cyber security: 5 ways Microsoft helps block threats – Microsoft Security Blog It looks at patches, credentials, monitoring, passwords …