What is your incident response plan if a hurricane is going to cross where you live and/or work? Johannes Ullrich who writes for SANS has written about his preparations. I am not going to say much about them – they are a description of a technical response to a serious …
NHS Trusts hit by a cyber attack on a software vendor
Ortivus is a Swedish based provider of cloud based software for the health industry. Since 18 July it has been investigating a cyber security incident which has impacted a number of its services. These include the patient and transport information solution used by South Western Ambulance Service Trust and South …
Continue reading “NHS Trusts hit by a cyber attack on a software vendor”
Our training – risk analysis, cyber security, incident response, disaster recovery…
We always stress the importance of building and maintaining positive relationships based on trust, which we believe is crucial for running a successful business. As experts in the field, we can provide you with detailed training and guidance tailored to your specific needs, whether you’re a sole trader or leading …
Patches and Updates. When they go wrong…
I am always pushing the necessity of keeping up with patches and updates – they are everyone’s essential step for good cyber security. However here is the warning tale for when things go wrong at the vendor end: HP rushes to fix bricked printers after faulty firmware update (bleepingcomputer.com) When …
CyberAwake – Incident Follow-up
CyberAwake has published a follow-up article to my previous article on Cyber Security Culture. It looks at what you need to think about when it comes to the meetings following an incident: Cyber Security Incident Follow-up Meetings – (cyberawake.co.uk) How you approach these meeting can have a huge impact on …
Backups vulnerable
Backups of all your important information and systems, resilient to attack, is an essential part of any incident response and business continuity plan. So anything that could impact that back-up must be a priority to solve. So if you use Veeam back-up you need a conversation: Hackers target vulnerable Veeam …
Ransomware is still the top threat…
Another school has been hit by ransomware. They tend to be soft targets for threat actors as they use a range of predictable applications, their IT teams are not large, IT tends not to be a priority and they have a large group of potential victims for phishing emails etc. …