Having ended last week’s cyber security news with ransomware stories and then starting this week’s news again with ransomware, our Operations Manager Martin and I ended up talking about the first time he and I dealt with this type of malware on a client’s network and in-house server… Ransomware in …
Move away from text- or voice-based multi-factor authentication
Let’s take a look at what good multi-factor authentication is. I am writing a mini-series for CyberAwake about the mistakes users make when choosing a secure password and how hackers can exploit those mistakes, so a quick look at MFA seems like a good idea. What is multi-factor authentication? A …
Continue reading “Move away from text- or voice-based multi-factor authentication”
Octagon Technology’s Security Operations Centre is Online
Our Security Operations Centre (SOC) is now operational and our first clients are already benefiting from our continuous 24/7 monitoring, analysis, alert and response service. You could as well… Why you need a Security Operations Centre Here is a great quote from the director of the Security Operations Centre: A …
Continue reading “Octagon Technology’s Security Operations Centre is Online”
The wrong way to manage security patches…
…let the UK Government scrutinise your security patches before you are allowed to publish them to your vulnerable customers! Sounds like a bad dream. Read on. Security Patches are Important Alarm surrounds a clause in the UK’s Investigatory Powers Act. According to the proposed legislation, tech firms will be mandated …
Continue reading “The wrong way to manage security patches…”
How does ransomware breach your defences?
In many cases the threat actors exploit a weakness in software you are using, This is what has happened in the case of the Clop ransomware gang, the flawed MOVEit software and the Colorado Department of Health Care Policy & Financing: Colorado warns 4 million of data stolen in IBM …
Continue reading “How does ransomware breach your defences?”