The last time I can remember having to use a bank card to make a payment was a couple of months back, at Fords to put a deposit on a new car. Interestingly enough the service centre at the same garage just took Apple Pay. (Also I am still waiting …
You can take all the defensive steps you can think of then there is a Zero-Day!
A zero-day attack refers to the gap between the “secret” launch of a cyber attack and the subsequent discovery of the attack and mitigation being available. In this gap your defences have not yet been updated because your security vendor is unaware there is problem. Your systems a laid bare …
Continue reading “You can take all the defensive steps you can think of then there is a Zero-Day!”
Attachments are a favourite attack vector
It obvious that for businesses to work they will be constantly exchanging email with clients, suppliers and internally and that many of these emails will contain important attachments. If we recognise this then so do the bad actors and they will exploit this business function if they can. Some attachments …
Continue reading “Attachments are a favourite attack vector”
You must do this if you use Microsoft 365
Do you want more security from ransomware? Michael, one of the support team over at Octagon Technology has written about one of the often overlooked steps by user of Microsoft 365. Microsoft 365 Security – Octagon Technology You should also look at their Pick-up and Go solution – 365R.
Microsoft Exchange server vulnerabilities
Microsoft Exchange server vulnerabilities On the 5th of January 2021 there was an exploit reported on the Microsoft Exchange server and on the 6th January 2021 the first breach was observed. But nobody really knew anything about it. “The attacker was detected by a group on the 5th of January …
Continue reading “Microsoft Exchange server vulnerabilities”