Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about paperwork in reality – except for that copy on the office shelf – the paperwork is probably just a collection of M365 and PDF files, saved in the cloud. However, sometimes …
Encryption – A Primer
Over the past couple of weeks, I have been writing a short series looking at the basics of encryption, how you can use it to improve your cyber security and some of the issues you need to address if you are using it. As I have done with other mini-series …
Keep It Simple… Encryption (pt. 4)
You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
Keep It Simple… Encryption (pt. 1)
Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
Now Microsoft Teams is a target for threat actors
Once Microsoft finally closed the door on the Office macro the threat actors had to move on: Microsoft Office Macros – The Good, The Bad and the Ugly – CyberAwake OneNote was their first target: Now OneNote is an attack vector | Smart Thinking Solutions QakNote – OneNote malware now …
Continue reading “Now Microsoft Teams is a target for threat actors”