You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
Keep It Simple… Encryption (pt. 1)
Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
USB cyber-attack – Device Security (Pt. 4)
I thought I was done with device security for the time being – but then, of course, I got a question from a client. “What about USB drives?” Rather than write a completely new article let me reprint an article I wrote for CyberAwake looking at USB storage security – …
Continue reading “USB cyber-attack – Device Security (Pt. 4)”
Includes “AI” for your convenience!
I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …
In Support of Encryption
The idea for this article on encryption came to me whilst reading Joe Haldeman’s The Hemingway Hoax (see the disclaimer at the end of this article) – written in 1990 it was slightly ahead of the computer revolution. In the book, three people are involved in a fraud to produce …