Computers and servers are always top of the list for patches and updates – but who remembers that router or UPS tucked away out of sight? Here is why you need a Cyber Security Master Document , so you do not forget your APC UPS! APC warns of critical unauthenticated …
A condom in use!
Last Friday I ran a story on the use of so called USB condom to protect yourself from data theft via public USB charging ports. Now if that title is not click bait, then I do not know what is! Using my USB Condom This week I am away and …
Do you use a USB condom?
This is a nice little piece of “off the wall” cyber security. How many of us plug our phones and devices into public USB charging ports, in trains, hotels etc.? Have you ever thought that the port may be connected to a computer which could steal your data? Alright it …
Do you have a policy to securely dispose of your redundant equipment?
Or do you let your staff or IT Support sell it on eBay? $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned | Ars Technica We do not resell equipment we are charged with disposing of securely.
Long term firmware compromise
This is an article looking at the invisible threat in our hardware – UEFI rootkit attacks. Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us | Ars Technica
