I could get a dictionary definition here – but instead I will simply say it is a trusted employee betraying that trust and revealing your information to an unauthorised party. Most of us would immediately think people in high positions of trust selling high value information to your competitors and …
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
Supply chain vulnerability
We have many clients who have their own software or have custom software on their website or web apps written for them by developers. These developers may or may not reuse code or modules written by third party developers and sourced through a software repository – such as GitHub or …
Five simple steps
This is an excellent article by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management at Microsoft looking at five simple steps any organisation should consider making to improve their cyber security: 5 ways Microsoft helps block threats – Microsoft Security Blog It looks at patches, credentials, monitoring, passwords …
If you want to help the hackers attack your organisation – then play the blame game!
It may not appear obvious, but if you look to blame someone when there is a cyber security incident, then it is almost guaranteed that those incidents will always worse than they needed to be. Why? Read about it here: The Blame Game – CyberAwake