Regular readers will know the importance I attach to software and firmware patches as part of any cyber security plan. In fact, with most projects, managed and monitored updates one of the first things we implement across an organisation as it gives an immediate win for improved cyber security. Restarting …
It is hard to keep a secret
I have written many articles describing how the first steps in any cyber security plan has to be the recognition that you and your team need to be able to keep a secret. For instance the first secret is of course to keep any passwords you have been given access …
Because It’s Friday – How big is your pot?
I think the biggest pan we have in our kitchen is about 15l (about three and a quarter gallons). We use it for batch cooking. But what is the biggest pot you have in your kitchen? Of course, regular readers of “Because It’s Friday”, know that this question is heading …
Continue reading “Because It’s Friday – How big is your pot?”
New ways to steal your credentials
The threat actors do not stand still when it comes to cyber-attacks, they are constantly evolving new attack vectors as we start to understand and combat the current ones. Keeping up with these changes, especially when it comes to phishing emails – which is one of the most common ways …
Device Security (Pt. 2)
This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …