Practice Drinking Coffee* better known as Planning and Preparation

coffee

Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …

CISA adds a software development tool vulnerability to the Known Exploited Vulnerabilities Catalog and security advisories

The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability for Telerik, a software development tool, to it’s Known Exploited Vulnerabilities Catalog: CISA Has Added One Known Exploited Vulnerability to Catalog | CISA This week CISA also released a security advisory for a range of Apple products, …

Five simple steps

This is an excellent article by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management at Microsoft looking at five simple steps any organisation should consider making to improve their cyber security: 5 ways Microsoft helps block threats – Microsoft Security Blog It looks at patches, credentials, monitoring, passwords …