For a successful ransomware attack the threat actors have to get their malware onto a user’s computer inside the secure network. Posing as your IT support is one way to get in: Ransomware gangs pose as IT support in Microsoft Teams phishing attacks – BleepingComputer Social Engineering In this attack …
Email Encryption
Today’s Wednesday Bit is a guest article by Martin from Octagon Technology, looking at email encryption and Microsoft 365. Ever thought about why you would need to encrypt an email? Well here is a scenario. If I am sending an email that has proprietary information in it and I don’t …
Things do wear out…
We have been working over the last few years to move all of our clients from Microsoft Exchange 2016 and 2019 servers onto more modern and hopefully more secure platforms. Once Microsoft stops cyber security support for these servers, the threat actors will attack any that are still online. Microsoft: …
The most basic of information privacy mistakes
When sending a group email out, but you do not want the group to know who the individuals are – use the bcc option. We all know this, and we all know of instances where it has not been used and the identities of all the other recipients have been …
Continue reading “The most basic of information privacy mistakes”
What’s in your email?
This article started life in couple of ways. Over on CyberAwake I re-ran an article from summer 2022, looking at how some information, useful to a threat actor, could leak out of your organisation this summer, just because of the use of a simple setting in Outlook: The Out-Of-Office Email …