This is always a difficult conversation with clients – when we come across redundant hardware or hardware that is reaching or reached it’s EOL – “you need to replace it”. It is always the cost! However sometimes you just have to do it – especially if it causes a security …
Why even small offices need to check their hardware
You may not be targeted but a vulnerable and then compromised small office router modem would be a step along the way for a bigger attack by Chinese hackers: Research reveals a malicious firmware implant for TP-Link routers, linked to Chinese APT group (checkpoint.com) This is why your network hardware, …
Continue reading “Why even small offices need to check their hardware”
Building on your BitLocker Cyber Security
A follow-on from last week’s article by Ben about Windows BitLocker encryption – BitLocker for Cyber Security. BitLocker for full disk encryption As Ben described, Windows BitLocker is a feature that encrypts your entire drive to protect your data from unauthorized access or theft. It is available on certain versions …
Continue reading “Building on your BitLocker Cyber Security”
BitLocker for Cyber Security
BitLocker is an often-overlooked cyber security tool provided by Microsoft. Why you should understand BitLocker Oh dear, you have lost your laptop, perhaps it was stolen or maybe you simply threw it away. I hope there was nothing important or sensitive on it! At best you would have coursework or …
APC UPS cyber security flaws
Computers and servers are always top of the list for patches and updates – but who remembers that router or UPS tucked away out of sight? Here is why you need a Cyber Security Master Document , so you do not forget your APC UPS! APC warns of critical unauthenticated …