It is so easy to forget about those boxes in the cupboard, that your organisation depends on. I often find routers, switches and other devices left off my initial investigation document when I start an IT and Cyber Security Audit. Here is the reason why you must make sure they …
Not the story you want to read…
This is not the headline you want you want to read, when you have written Microsoft into your cyber security plan as an A1 trusted supplier of services! Hackers exploited Windows 0-day for 6 months after Microsoft knew of it | Ars Technica Mine and your expectations of Microsoft is …
The Threat Actors will abuse any service for their own ends
Researchers are warning that threat actors are abusing the Google Cloud Run – an application and website development and management service – to distribute banking trojans on an industrial scale: Hackers abuse Google Cloud Run in massive banking trojan campaign (bleepingcomputer.com) Your takeaway Any applications or software you have written …
Continue reading “The Threat Actors will abuse any service for their own ends”
Cyber-breach reporting rules are a good thing for all of us
There are hundreds of reasons organisations, lobbyists and some politicians will quote for not reporting a cyber-security breach – most will have to do with money. The one reason the rest of us should be in favour of reporting rules is that it is our data that these organisations have …
Continue reading “Cyber-breach reporting rules are a good thing for all of us”
This is why a IT and Cyber Security audit makes sense
I am in the middle of an IT and Cyber Security audit for a company – which is why Diana is covering the CyberAwake articles at the moment. During the interviews I conduct, as part of my process, I was told no one used a global administrator account as their …
Continue reading “This is why a IT and Cyber Security audit makes sense”