The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …
You must do this if you use Microsoft 365
Do you want more security from ransomware? Michael, one of the support team over at Octagon Technology has written about one of the often overlooked steps by user of Microsoft 365. Microsoft 365 Security – Octagon Technology You should also look at their Pick-up and Go solution – 365R.
You cannot say enough about security
There is an article on the Octagon Technology site discussing their cyber security tools package. Security Built-in – Octagon Technology
Triple AAA – the most important concept in information security
Authentication – Authorisation – Accountability For good security you must authenticate (A number one) who has access to your information. Then, once they have proven beyond a doubt who they are, that should authorise (the second A) them to access only that information they are entitled to and no more. …
Continue reading “Triple AAA – the most important concept in information security”
…sometimes you just need a diversion
I am right in the middle of my cyber security Master’s dissertation so my time for business writing is limited – but sometimes you just need a diversion. I drove out to a parking spot I know nearby, out in the countryside to read academic papers and make some notes. …