I have written many articles describing how the first steps in any cyber security plan has to be the recognition that you and your team need to be able to keep a secret. For instance the first secret is of course to keep any passwords you have been given access …
Because It’s Friday – How big is your pot?
I think the biggest pan we have in our kitchen is about 15l (about three and a quarter gallons). We use it for batch cooking. But what is the biggest pot you have in your kitchen? Of course, regular readers of “Because It’s Friday”, know that this question is heading …
Continue reading “Because It’s Friday – How big is your pot?”
New ways to steal your credentials
The threat actors do not stand still when it comes to cyber-attacks, they are constantly evolving new attack vectors as we start to understand and combat the current ones. Keeping up with these changes, especially when it comes to phishing emails – which is one of the most common ways …
Device Security (Pt. 2)
This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …
Cyber Security Updates
The US government’s Cybersecurity and Infrastructure Security Agency (CISA) is a key resource for us to keep up with the cyber security patches issued by the major – and sometimes more fringe – vendors. We especially pay attention in the week of Microsoft Patch Tuesday, as other vendors often issue …