This may seem to be a strange question but how can you be sure who is actually texting you? Your phone may show you that you are texting with your friend or company IT support but there are ways for hackers to spoof who they appear to be or even …
The Wednesday Bit this week
One thing I learnt very quickly whilst studying and after graduation was that my degree in cyber security was only the tool to make me think about cyber security properly and unless I kept my personal study up to date the degree would soon become useless. That is why I …
What do hackers want?
Well in the case of the recent ransomware attack on the British Library they got HR data on the library’s staff. British Library says ransomware hackers stole data from HR files (therecord.media) The Rhysida ransomware gang will soon put that information up for auction on the Dark Web unless the …
When software has bugs…
Software is complicated – it will have bugs and some of those bugs may have security issues. How you deal with this situation is a key part of your organisation’s cyber security plan. Why? If you are a regular reader here, you would have read about the several zero-day security …
The anatomy of a phishing email
Phishing email cyber-attacks have to be the most common cyber-attack directed at any organisation. Most are trying to get the victim to reveal their credentials, often for Microsoft 365. Every week I spend time with clients discussing or investigating phishing emails and helping them put systems in place to help …