It is nothing new for me to say that patches and upgrades are an essential step in any organisation’s cyber security plan. Threat actors actively go after any system that has a weakness as soon as they know about it – many times before a vendor even knows there is …
Mobile phone thefts
I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …
Not CrowdStrike – Kombat Hamsters
Not all the news this week is going to be about a global company messing up their updates! Threat actors are always looking for the quickest and easiest way to reach the greatest number of victims – that is how their “business model” works! So exploiting a game with 250 …
Devices and Cyber Security – A Primer
I have written a number of articles over the past few weeks about how organisations need to be thinking about theirs’s and their employee’s devices and cyber security. Device Security (Pt. 1) Device Security (Pt. 2) Device Security Just One More Thing… When hardware reaches EOL – Device Security These …
Device Security
Today I have published the first part of a two-part article on device security over on CyberAwake. This is something many organisations skip over, if they have implemented a password policy and MFA! Device Security (Pt. 1) – CyberAwake Often the reluctance to take action is because they are concerned …