This is an excellent article by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management at Microsoft looking at five simple steps any organisation should consider making to improve their cyber security: 5 ways Microsoft helps block threats – Microsoft Security Blog It looks at patches, credentials, monitoring, passwords …
What do threat actors do with your stolen credentials?
I have written about one of the possible malicious uses of stolen credentials over on CyberAwake and I explain why if one of your team reuses a compromised password your organisation could be at risk. Read on here.
Just another Twitter cyber security story
Twitter is a rich source of cyber security and privacy stories at the moment. The BBC and The Guardian (itself in the middle of a cyber security incident at the moment) have updates on how much personal information, that was stolen from twit, twit, Twitter, is available on the dark …
Continue reading “Just another Twitter cyber security story”
The Electronic Frontier Foundation comments on the latest Apple privacy improvements
The Electronic Frontier Foundation advocates on online privacy and freedoms – here is what it has to say on Apple’s latest announcements: VICTORY! Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans | Electronic Frontier Foundation (eff.org)
Apple Privacy and Security Enhancements – I’m in
Apple has announced a range of security and privacy enhancements for the for their platforms including encryption of a range of personal data stored in their iCloud, for instance messages, photos, files etc.. It is being rolled out and tested in the US in the next few months and is …
Continue reading “Apple Privacy and Security Enhancements – I’m in”