Robots taking over? Clive is not sure but… A couple of weeks ago we were invited to speak to a Zoom meeting and this was basically a Question and Answer session. After reassuring the group that no question was too silly to ask, just that nobody had been brave enough …
The Phishing Email – Just one click…
This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …
Infected and you didn’t even know it…
When I am delivering the cyber awareness training – and people relax, realising I really mean it when I say there are no stupid questions – I often get asked “how do I know if my computer was infected?”. Usually just before being asked about the length of a piece …
Linux for Business (Part II)
This is part 2 my article about Linux at Work – part 1 is over on Octagon Technology. You should read that first before continuing. This is the continuing story of a surplus Windows 8 hybrid notebook/tablet conversion to Linux… Cyber Security on Linux Mint This section is a bit …
Where do you keep that Incident Response Plan? (Ransomware Mini-series Part 8)
Throughout this ransomware mini-series and other articles I write I refer to important documents you should have, a Cyber Security Master Document, an Incident Response Plan, a Business continuity Plan etc.. Once you have created these documents you need to keep them somewhere and that is something you need to …
Continue reading “Where do you keep that Incident Response Plan? (Ransomware Mini-series Part 8)”