There is no doubt that threat actors are becoming more organised, with skilled organisations, not only carrying out attacks, but suppling highly capable hacking tools to less skilled organisations – fo a cut of the illicit profits: New EvilProxy service lets all hackers use advanced phishing tactics (bleepingcomputer.com) This one …
Another hotel leaks guest’s personal information
This is not the first time I have reported on a data theft from a hotel group or tourist company – and as they make such great targets, it probably will not be the last… Holiday Inn hotels hit by cyber-attack – BBC News Obviously if you have stayed in …
Continue reading “Another hotel leaks guest’s personal information”
Cyber incident insurance – UPDATED
This post was originally made on 24 August 2022 Update 6 September 2022 Here is an excellent background article from Jude Karabus on The Register looking at why Lloyds has decided not to pay out cyber incident insurance claims that can be attributed to nation-state actions. Cyberinsurance would cost more …
Why authentication, authorisation and accountability are cornerstones of your cyber security
I have written an article over on CyberAwake, (our online cyber security training site), looking at triple A. Why you should care about the TLA AAA! – CyberAwake
False positives something we all have to deal with – Including Microsoft. At least read this post for its two Hitchhiker’s Guide to the Galaxy references!
Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …