There is an article on the BBC technology news site discussing the e-waste resulting from the mining of bitcoins: Bitcoin mining producing tonnes of waste – BBC News At the heart of this e-waste generation is blockchain technology – a very secure method of holding information across a distributed system. …
You have to wonder why companies make these types of decisions…
In a world where every business has to have heard of cyber-security and should always be thinking about how to protect their information and their client and customer privacy it is incredible to hear of a company that felt they could keep PII on a single smartphone. It was then …
Continue reading “You have to wonder why companies make these types of decisions…”
Triple AAA – the most important concept in information security
Authentication – Authorisation – Accountability For good security you must authenticate (A number one) who has access to your information. Then, once they have proven beyond a doubt who they are, that should authorise (the second A) them to access only that information they are entitled to and no more. …
Continue reading “Triple AAA – the most important concept in information security”
Microsoft Exchange server vulnerabilities
Microsoft Exchange server vulnerabilities On the 5th of January 2021 there was an exploit reported on the Microsoft Exchange server and on the 6th January 2021 the first breach was observed. But nobody really knew anything about it. “The attacker was detected by a group on the 5th of January …
Continue reading “Microsoft Exchange server vulnerabilities”
Between Timbuktu and Timid
I wrote this blog to make some simple suggestions for effective security steps that business owners can take that do not take much time. The title of the blog is a quote from Kurt Vonnegut’s 1959 book The Sirens of Titan. If you look these words up in a dictionary …