This is a follow-up to an article Martin wrote about a computer he found whilst helping a client move offices. It is surprising what you can find in the back of cupboards. Whilst helping him find out more details about his portable computer I came across this video by The …
Defence in Depth
One of the things that came out of the conference I attended on Tuesday in London, was defence in depth, combatting the ways in which the threat actors have expanded their attack vectors and tactics to evade various modern technical and human defences. The message we should all take from …
Our Newsletter was published today…
…did you get your copy? I do not usually promote the newsletter, but I have been reminded to by Amanda – who puts the hard work in for both our newsletter and Octagon’s newsletter. You have been reminded – sign up here: Sign up to our Newsletters | Smart Thinking …
We have done passwords, now let’s do MFA
Following on from the Back-to-Basics Password Primer mini-series – my latest article on CyberAwake is discussing the basics of multi-factor authentication (MFA): Back to Basics – MFA – CyberAwake In the next part I am going to discuss some of the weaknesses in MFA as a cyber security tool. Back …
Where Do You Keep Your Passwords?
I was wondering what to write about this week for “The Wednesday Bit” – I knew it was not going to be passwords. I have had enough of that! I got started on a spin-off topic from an IT and Cyber Security Audit I am running at the moment about …
