This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …
Device Security
Today I have published the first part of a two-part article on device security over on CyberAwake. This is something many organisations skip over, if they have implemented a password policy and MFA! Device Security (Pt. 1) – CyberAwake Often the reluctance to take action is because they are concerned …
Secure those Online Services
We were early adopters when Microsoft launched Office 365, the online services that would become Microsoft 365. Up to then we had been purchasing Microsoft Office licenses each time a new version of Office was released, which was a substantial cost to a small IT company, but we needed to …
It All Starts with a Phishing Email
Following my article yesterday about phishing emails, here on Smart Thinking, I have contunued the phishing email advice over on CyberAwake today. This time we are looking at the big targets: It All Starts with a Phishing Email – CyberAwake Do you need cyber security awareness training? WE understand that …
Do you want fries with that hack
Setting up phony websites with just a letter different from the legitimate sites is nothing new – I can remember a marketing company (now defunct) trying to persuade me to buy dozens of variations of our IT support company domain, to capture those potential customers who have “fat fingers” – …