Skip to content
Smart Thinking Solutions Cyber Essentials Certified

Smart Thinking Solutions

Cybersecurity Starts in the Boardroom

  • Home
  • Services
  • Contact Us
  • Clive Catton
  • Newsletters
  • Free eBook
  • Search

Tag: accountability

Posted on 2 February 20232 February 2023

What is the Insider Threat?

I could get a dictionary definition here – but instead I will simply say it is a trusted employee betraying that trust and revealing your information to an unauthorised party. Most of us would immediately think people in high positions of trust selling high value information to your competitors and …

Continue reading “What is the Insider Threat?”

Posted on 24 January 202324 January 2023

International Co-operation to Disrupt Ransomware

Ransomware will not go away – threat actors make too much money and steal too much valuable information using it. Now 36 nations and the EU member states have created a five department coalition of expertise to disrupt and combat ransomware. The International Counter Ransomware Task Force’s (ICRTF) operations cover: …

Continue reading “International Co-operation to Disrupt Ransomware”

Posted on 15 November 202215 November 2022

YOU WILL NOT PAY THAT RANSOMWARE DEMAND!

ransomware

Australia has been in the cyber security headlines recently with a couple of high-profile hacks that has seriously impacted millions of citizens: Now it is being reported that the Australian government is considering bringing in legislation to prevent organisations legally paying ransomware demands, in an attempt to disrupt the threat …

Continue reading “YOU WILL NOT PAY THAT RANSOMWARE DEMAND!”

Posted on 10 November 202210 November 2022

Australia in the cyber security spotlight – UPDATED

AAA

This article was first posted on 27 October 2022 Update 10 November 2022 The headlines say it all: Medibank: Data stolen from Australia health insurance available online – BBC News Medibank hacker says ransom demand was US$10m as purported abortion health records posted | The Guardian These criminals will have …

Continue reading “Australia in the cyber security spotlight – UPDATED”

Posted on 5 October 20225 October 2022

How a phishing attack works

phishing email threat

Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …

Continue reading “How a phishing attack works”

Posts pagination

Previous page Page 1 … Page 5 Page 6 Page 7 Page 8 Next page

Smart Thinking Solutions is a trading name of Octagon Technology Ltd. ©  2021 Octagon Technology Ltd

Smart Thinking Solutions supports Let's stop abuse together

Privacy Policy  Cookie Policy  1000 posts  Sign up to our Newsletter Proudly powered by WordPress
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
CONSENT16 years 3 months 3 days 14 hours 29 minutesYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
IDE1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSCsessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-idneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
cookielawinfo-checkbox-functional1 yearThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
SAVE & ACCEPT
Powered by CookieYes Logo