…it doesn’t mean you cannot be a cyber crime victim. Putting you under-pressure or approaching you when you are under stress is a classic way threat actors successfully exploit their victims. Here is an example on the BBC of such an attack: The robotic falcon maker who lost £100,000 to …
The cost of a data breach
Here is a follow-up story to the recent Capita data breach. Capita admits cost of March breach will be up to £20M • The Register Capita is the UK’s largest outsourcing company with the UK armed forces, government and some very large companies as its clients. So the costs of …
ONLY get your Windows updates via the Updates app
We write a lot about patches and updates – they are important to keep your organisation secure. But do not be tempted when browsing the web to follow a helpful advert that offers you Windows updates. That is not how it is done! Fake in-browser Windows updates push Aurora info-stealer …
Continue reading “ONLY get your Windows updates via the Updates app”
Why authentication, authorisation and accountability are cornerstones of your cyber security
I have written an article over on CyberAwake, (our online cyber security training site), looking at triple A. Why you should care about the TLA AAA! – CyberAwake
When your technical defences fail – CyberAwake
I have written about how to defend your cybersecurity when your firewalls, anti-virus and other defences fail you: