The original post was published on 16 September 2022 This is a real problem, no software or system should keep any security token in plain text, any time during operation. The user base for Microsoft Teams is in excess of 270 million users – we are part of that number …
Be careful of security theatre and user security fatigue
Would your Global Administrator account security up to our standard? Protecting credentials is an important step in any cyber security plan. One of the first things we always do when taking on a cyber security client, before we even embark on the fact finding and documentation, is make sure everyone …
Continue reading “Be careful of security theatre and user security fatigue”
Ransomware this week
There have been several high profile ransomware attacks this week – and small ones that do not make the news. Ransomware attack knocked a Kentucky city-operated ISP offline before holiday – The Record by Recorded Future Lorenz ransomware breaches corporate network via phone systems (bleepingcomputer.com) Ransomware gang threatens 1m-plus medical …
Why authentication, authorisation and accountability are cornerstones of your cyber security
I have written an article over on CyberAwake, (our online cyber security training site), looking at triple A. Why you should care about the TLA AAA! – CyberAwake
Maybe this attack may not target my readers, but you never know?
The is active attack running on the internet at the moment targeting the CEOs and CFOs of some of the biggest companies around. These threat actors are not looking for targets of opportunity, for the work they put in they only want targets that can return millions of Pounds or …
Continue reading “Maybe this attack may not target my readers, but you never know?”