We all depend on the various technical cyber security solutions we deploy, firewalls, anti-virus, end point detection and response (EDR), there are many names and the threat actors know we depend on them. So it should come as no surprise that there are attacks, that first attempt to disable these …
The fast track for better cyber security
Modern cyber security tools are well within the budget of even the smallest organisations- even one person businesses. We have a webinar this week to tell you how. This article will give you some background it includes a link to sign up for either the webinar or to get the …
Infected USB Drives
It is a very old attack, infect a USB stick and leave it somewhere. Who ever finds it may (will) plug it into a computer to see what is on it. It is human nature. If leaving the infected drive in Starbucks seems to random – then post them out …
You have protection – hackers have evasion
In a forth coming article about our new Security Operations Centre (SOC-as-a-Service), I discuss the different between passive protection – which you must have – and reactive, continuous 24/7 Cyber Security Monitoring. This article from Bleeping Computer illustrates how threat actors carefully take apart the protection you are using to …
Continue reading “You have protection – hackers have evasion”
Linux for Business (Part II)
This is part 2 my article about Linux at Work – part 1 is over on Octagon Technology. You should read that first before continuing. This is the continuing story of a surplus Windows 8 hybrid notebook/tablet conversion to Linux… Cyber Security on Linux Mint This section is a bit …