Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …
Who do you trust? A new mini-series.
I have started a new mini-series over on CyberAwake looking at the Insider Threat. The Insider Threat – Not just a question of trust. (pt.1) The first part is setting the scene, before we start looking for defences.
Back-to-Basics – The Collection III
Having come back from a week’s holiday, I have been busy catching up, so this week the Wednesday Bit about reminding you about my collection of Back-to-Basics cyber security primers. Why am I doing this? Because we can all benefit from some cyber security training, whatever our level of expertise. The articles …
Keep control of your information
I have implemented information control for one-person organisations – because even a small organisation will have some need to share information with other people and organisations. It is an essential step in any IT and Cyber Security Audit to examine who, has access to what information and what steps are …
Back-to-Basics – A Phishing Email Primer
I am having a break this week from the “Wednesday Bit”, but what I do have for you is my today is my completed Phishing Email Primer. However my track record for these Back-to-Basics mini-series is that they do not stay “complete” for very long, so do keep an eye …