I am a great advocate of clients using encryption to enhance their cyber security and I have written a number of articles explaining how encryption is an easy cyber security step to implement. Here are a couple of them: In Support of Encryption Email Encryption I also think encryption is …
Celebrity Phishing Attack
On his own confession – Nick clicked on a link in what looked like a genuine email from X and then lost control of his account. The email had explained that he had made a post that had violated X’s rules and his account was going to be closed – …
Because It’s Friday – Bang!
Following on from last week’s amazing, let’s start this week’s “Because It’s Friday” with a YouTube short: Bang! Are you watching The Traitors? We are, although it drives me mad! In this season one of the contestants is faking a Welsh accent in an attempt to be “trusted more” and …
The most basic of information privacy mistakes
When sending a group email out, but you do not want the group to know who the individuals are – use the bcc option. We all know this, and we all know of instances where it has not been used and the identities of all the other recipients have been …
Continue reading “The most basic of information privacy mistakes”
Is the data on that phone a secret?
To law enforcement around the world, who have access to Graykey, a phone unlocking and forensics tool, possibly not. Bruce Schneier has a piece – with links to further articles – looking at just what law enforcement can and cannot read using this software. What Graykey Can and Can’t Unlock …