The second part of my Back-to-Basics series looking at the cyber security risks and actions associated with the insider threat has been published today on CyberAwake. The Insider threat – Start thinking about sorting. (pt.2) – CyberAwake Did you miss part one? Not a problem: The Insider threat – Not …
Who do you trust? A new mini-series.
I have started a new mini-series over on CyberAwake looking at the Insider Threat. The Insider Threat – Not just a question of trust. (pt.1) The first part is setting the scene, before we start looking for defences.
USB cyber-attack – Device Security (Pt. 4)
I thought I was done with device security for the time being – but then, of course, I got a question from a client. “What about USB drives?” Rather than write a completely new article let me reprint an article I wrote for CyberAwake looking at USB storage security – …
Continue reading “USB cyber-attack – Device Security (Pt. 4)”
The risk of USB memory sticks
Even with cloud computing we all still use USB data storage devices – I know I do – but do you have a policy in place to protect your organisation from cyber-attacks originating from USB drives? Have a read of this article I wrote for CyberAwake that looks at that …
Russian offensive malware spreads outside Ukraine
We have not heard much recently about the cyber war between Ukraine and Russia but here is a story that illustrates what I have been saying about malware creep and collateral damage from deployed malware weapons. By the very nature of online commerce and communications these cyber-weapons will spread outside …
Continue reading “Russian offensive malware spreads outside Ukraine”