It still works, set up a lot of devices to just try their luck to break into as many M365 accounts as possible – it will work sometimes. In this case over 100,000 devices have been hijacked to create a botnet that also side steps MFA security using an outdated …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
The Insider Threat Primer
Having to discuss the insider threat with clients is always difficult – they are always already trusting someone (even if they do not think so) and I am calling that trust into doubt. My reports and discussions always include the statement “monitoring what your team does with your information and …
When paperwork is paperwork!
Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about paperwork in reality – except for that copy on the office shelf – the paperwork is probably just a collection of M365 and PDF files, saved in the cloud. However, sometimes …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …