I write a lot about phishing emails and social engineering attacks, because it is probably the way threat actors could most easily get malware inside your defences and from there compromise your security, your information and ultimately your wallet! The Berkshire based construction company, Interserve Group Ltd, with an employee …
What can you do if you get infected by ransomware?
Fall back and use your ransomware resilient back-up to recover your encrypted information – and hope that your data classification and segregation has protected your most sensitive information from exfiltration and exposure in the public domain. Or you could hope that the Dutch police have recovered the ransomware decryption key …
Continue reading “What can you do if you get infected by ransomware?”
How a phishing attack works
Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …
Hacking is not just data theft and ransomware – it can be reputation damage. Some advice about your WordPress website and your reputation.
Fast Company an American magazine was hacked and abusive articles added to its news feeds, resulting in this material getting a wider audience through syndication on the Apple News app. The Apple News channel was quickly disabled and Fast Company took its site down pending a fix but the damage was …
A word about BYOD
I have just published an article over on our online training site – CyberAwake – looking at some of the steps in examining the risk of using employee devices for work purposes – BYOD or Bring Your Own Device. Are you using Bring Your Own Device – BYOD – to …