So most organisations use Microsoft Office in some way. Even if it they do not use it, someone will email them a Word or Excel document. You cannot avoid it – even on a Mac or Linux computer. That makes it a juicy target for threat actors – there are …
How to evade reputation based email cyber security
A very effective way to reduce phishing email is to enforce only receiving email from reputable email services. If you have not heard of this type of email protection then it is time to get in contact with us. However if the threat actors have a method of hijacking one …
Continue reading “How to evade reputation based email cyber security”
Hardware the overlooked cyber security risk
Just last week we had to intervene when a client was going to donate their redundant computers to a charity. We ran our disposal procedure over them before we let them go. Then I saw this in the tech news: Canon warns of Wi-Fi security risks when discarding inkjet printers …
Continue reading “Hardware the overlooked cyber security risk”
WhatsApp user data stolen
I have just written about the information leak at NHS Lanarkshire because of the use of WhatsApp and I regularly talk about rogue Android apps that get into the Google Play Store – here I bring both of them together. A rogue app that steals WhatsApp user data: Hackers steal …
This is why a IT and Cyber Security audit makes sense
I am in the middle of an IT and Cyber Security audit for a company – which is why Diana is covering the CyberAwake articles at the moment. During the interviews I conduct, as part of my process, I was told no one used a global administrator account as their …
Continue reading “This is why a IT and Cyber Security audit makes sense”