This is an excellent academic article by Susan Landau on the privacy, efficacy, and equity of contract-tracing on smartphone apps. She raises some important points about the social and economic divide when it comes to technology, something that other developers and technologists should consider when creating their apps. Digital exposure …
You have to wonder why companies make these types of decisions…
In a world where every business has to have heard of cyber-security and should always be thinking about how to protect their information and their client and customer privacy it is incredible to hear of a company that felt they could keep PII on a single smartphone. It was then …
Continue reading “You have to wonder why companies make these types of decisions…”
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …
Email rules
The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …
Cyber Security for how much?
I have written an article for Octagon Technology looking at the risk and the cost of cyber security. So you want cheap Cyber Security? – Octagon Technology
You must do this if you use Microsoft 365
Do you want more security from ransomware? Michael, one of the support team over at Octagon Technology has written about one of the often overlooked steps by user of Microsoft 365. Microsoft 365 Security – Octagon Technology You should also look at their Pick-up and Go solution – 365R.
You cannot say enough about security
There is an article on the Octagon Technology site discussing their cyber security tools package. Security Built-in – Octagon Technology