Multi-factor authentication stands between you and a threat actor gaining access to your services – but the attackers have come up with a simple way to subvert it. Just keep bombarding you with authentication requests until you either give in or make a mistake. If the hacker has your correct …
Building on your BitLocker Cyber Security
A follow-on from last week’s article by Ben about Windows BitLocker encryption – BitLocker for Cyber Security. BitLocker for full disk encryption As Ben described, Windows BitLocker is a feature that encrypts your entire drive to protect your data from unauthorized access or theft. It is available on certain versions …
Continue reading “Building on your BitLocker Cyber Security”
Passwordless Google Accounts
I’m in. I have written about passwordlessness (I probably made that word up!) before. Eliminating the password makes it much harder for threat actors to compromise your security, exploit stolen credentials and gain unauthorised access to systems such as Microsoft and now Google: Google adds passkeys support for passwordless sign-in …
BitLocker for Cyber Security
BitLocker is an often-overlooked cyber security tool provided by Microsoft. Why you should understand BitLocker Oh dear, you have lost your laptop, perhaps it was stolen or maybe you simply threw it away. I hope there was nothing important or sensitive on it! At best you would have coursework or …
Kyocera Android App vulnerability but iOS users should not be smug…
Android apps need careful management We have an HP SoHo printer in the office, that the team use when they are here. The iPhone users use AirPrint the Android users use an approved app, as we have a BYOD policy in place for the all devices. This is especially important …
Continue reading “Kyocera Android App vulnerability but iOS users should not be smug…”