Authentication, Authorisation and Accountability (AAA) and The Principle of Least Privilege (PoLP) come together in this primer to give you a basic understanding of the importance of knowing who is accessing your information and how much they can access. Another important idea covered here is what happens when something goes …
Keep It Simple… Encryption (pt. 4)
You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
Keep It Simple… Encryption (pt. 1)
Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
Manage and Patch that Hardware
It is so easy to forget about those boxes in the cupboard, that your organisation depends on. I often find routers, switches and other devices left off my initial investigation document when I start an IT and Cyber Security Audit. Here is the reason why you must make sure they …
USB cyber-attack – Device Security (Pt. 4)
I thought I was done with device security for the time being – but then, of course, I got a question from a client. “What about USB drives?” Rather than write a completely new article let me reprint an article I wrote for CyberAwake looking at USB storage security – …
Continue reading “USB cyber-attack – Device Security (Pt. 4)”