Authentication, Authorisation and Accountability (AAA) and The Principle of Least Privilege (PoLP) come together in this primer to give you a basic understanding of the importance of knowing who is accessing your information and how much they can access. Another important idea covered here is what happens when something goes …
Keep It Simple… Encryption (pt. 4)
You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
I have an LG TV!
Researchers at BitDefender have discovered cyber security flaws in WebOS, the operating system used in LG smart TVs. Over 90,000 LG Smart TVs may be exposed to remote attacks (bleepingcomputer.com) I manual ran a software update on my TV to ensure it is running the latest secure version of WebOS. …
SharePoint – More pain for Microsoft but we still have a free gift for you…
It is never a good cyber security story, when I read there is a security issue with SharePoint – I have written many cyber security plans that depend on the integrity of Microsoft and SharePoint. New SharePoint flaws help hackers evade detection when stealing files (bleepingcomputer.com) Audit logs are a …
Continue reading “SharePoint – More pain for Microsoft but we still have a free gift for you…”
Catching up with CISA
The US government Cybersecurity and Infrastructure Security Agency (CISA) is one of our go-to information sources for cyber security information. Here is a round-up of their latest alerts: Apple Released Security Updates for Safari and macOS | CISA Cisco Releases Security Updates for Multiple Products | CISA Fortinet Releases Security …