If you follow effective privacy principles such as UKGDPR, it can help any organisation create better cyber security. However Bruce Schneier has an interesting essay out this week, where he looks at our degraded expectations of privacy because of modern technology. Online Privacy and Overfishing – Schneier on Security I …
Phishing Attacks – It is in the numbers. (pt 6)
I think we have established two key points in previous articles in this Back-to-Basics, Email Phishing Primer: 1 – Threat actors’ primary motivation for sending out phishing emails is financial. 2 – One of the best tactics any organisation can use to defend against phishing attacks is cyber security awareness …
Continue reading “Phishing Attacks – It is in the numbers. (pt 6)”
What happens when a third party you rely has cyber issues?
In the case of a number of major London hospitals you start cancelling operations and appointments for patients and critical test results are delayed. Cyber-attack on London hospitals declared critical incident – BBC News Among those impacted because they work with Synnovis – a provider of pathology services – are: …
Continue reading “What happens when a third party you rely has cyber issues?”
Credentials are King
Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …
Do you use Ticketmaster for your events?
If so it is time to speak to your cyber security support and check if your customer’s data has been compromised? Ticketmaster confirms massive breach after stolen data for sale online (bleepingcomputer.com) The ransomware gang, Shiny Hunters, has tried to sell the Ticketmaster data on the Dark Web. Here is …