One of the things that came out of the conference I attended on Tuesday in London, was defence in depth, combatting the ways in which the threat actors have expanded their attack vectors and tactics to evade various modern technical and human defences. The message we should all take from …
Here we go again…
Let’s start with your takeaway from this story. You need to include your network infrastructure/hardware in your cyber security plan and updating. Check with your IT and/or Cyber Security Support that this is being done. (Our team has just completed a complete Wi-Fi infrastructure upgrade for a complex site that …
Do you use Zyxel equipment?
If your network uses Zyxel equipment then you need to check if it is on the list compromised equipment that needs patching. Zyxel warns of critical vulnerabilities in firewall and VPN devices (bleepingcomputer.com)
So selling redundant gear sounds like a good idea…
Selling redundant gear and wiping hard drives on computers has pretty much become standard over the last few years – whether the machines are going for resale, donation, upcycling or recycling. But what happens when it comes to cyber security critical network devices? These bits of kit can be eye-wateringly …
Continue reading “So selling redundant gear sounds like a good idea…”
But patching is not the whole story…
Earlier this week I posted about the importance of patches (again) when it comes to cyber security: However understanding your network components and endpoints and monitoring them is also very important as occasionally there is persistent malware that protects itself from security patches designed to eliminate it. Here is an …