You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
Keep It Simple… Encryption (pt. 1)
Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
Now Microsoft Teams is a target for threat actors
Once Microsoft finally closed the door on the Office macro the threat actors had to move on: Microsoft Office Macros – The Good, The Bad and the Ugly – CyberAwake OneNote was their first target: Now OneNote is an attack vector | Smart Thinking Solutions QakNote – OneNote malware now …
Continue reading “Now Microsoft Teams is a target for threat actors”
Do you want to access your passwords?
When LastPass reset their MFA security they locked their clients out as well as the threat actors. LastPass users furious after being locked out due to MFA resets (bleepingcomputer.com) Your takeaway LastPass is a good way to keep your passwords secure – but you are giving LastPass or other password …
Risk Analysis – How to eat a very large quadruped!
Today we are going to look at the very first meeting I have with clients where we look at risk analysis. This is not a blog about eating an elephant – that is a figure of speech – although I do have a book that includes a paragraph or two …
Continue reading “Risk Analysis – How to eat a very large quadruped!”