Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
USB cyber-attack – Device Security (Pt. 4)
I thought I was done with device security for the time being – but then, of course, I got a question from a client. “What about USB drives?” Rather than write a completely new article let me reprint an article I wrote for CyberAwake looking at USB storage security – …
Continue reading “USB cyber-attack – Device Security (Pt. 4)”
Includes “AI” for your convenience!
I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …
In Support of Encryption
The idea for this article on encryption came to me whilst reading Joe Haldeman’s The Hemingway Hoax (see the disclaimer at the end of this article) – written in 1990 it was slightly ahead of the computer revolution. In the book, three people are involved in a fraud to produce …
Russian offensive malware spreads outside Ukraine
We have not heard much recently about the cyber war between Ukraine and Russia but here is a story that illustrates what I have been saying about malware creep and collateral damage from deployed malware weapons. By the very nature of online commerce and communications these cyber-weapons will spread outside …
Continue reading “Russian offensive malware spreads outside Ukraine”