I have just started an IT and Cyber Security Audit for a client and we have barely started when the issue of mobile phone use has come up – because there are more cyber security risks with Android devices when compared to iOS devices. Over 90 malicious Android apps with …
Email phishing needs bait… (pt 5)
We looked at some of the most common types of email phishing attacks in the last part of this Back-to-Basics mini-series and I had promised you today an article on “size matters”, but I have changed my mind. Every day I read up on the latest threats and developments in …
Email Phishing Attacks
I have published part 4 of my Back-to-Basics mini-series looking at how phishing attacks work and how they impact organisations every day, over on CyberAwake. Phishing Primer – Phishing Types (pt. 4) Here are parts 1 to 3: Phishing Primer – Social Engineering (pt. 1) Phishing Primer – Social Engineering …
Something extra for the weekend.
“Beacuase It’s Friday” has been published for this week – Because It’s Friday – Electronic Mail | Smart Thinking Solutions – but as I was reading the cyber security news this morning this page came up on my BBC News feed. A BBC Newsround report from 1992 about the Michelangelo …
Fake cheat codes should get you thinking about your hybrid workers
I am never popular when I am helping organisations create cyber security plans and I insist that company laptops are only for company business. This applies double when the laptop is used at home or on holiday – you cannot let your significant other or others use the company computer. …
Continue reading “Fake cheat codes should get you thinking about your hybrid workers”