We have written several articles recently about how critical patches and updates are to your cyber security. Here is another reason why: Proof-of-Concept released for critical Microsoft Word RCE bug (bleepingcomputer.com) Once the threat actors are aware of a vulnerability – whether it is patched or not – they will …
Minimise the Damage – Planning and Preparation – Ransomware Part 3*
I have a companion article to this one to this one looking at the planning and preparation needed if you are not plugged in! Pull the Plug: But I haven’t got a plug! In my previous ransomware article, in this mini-series, we had a quick look at some spanners and …
Continue reading “Minimise the Damage – Planning and Preparation – Ransomware Part 3*”
Even the biggest suppliers have outages
Microsoft’s Outlook.com email service has been and is suffering a series of outages that is impacting it’s users. This is not a common service used by business, however we do have some clients, who have a need to use this type of service ( I am not sure if they …
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
Supply chain vulnerability
We have many clients who have their own software or have custom software on their website or web apps written for them by developers. These developers may or may not reuse code or modules written by third party developers and sourced through a software repository – such as GitHub or …