I have written many articles describing how the first steps in any cyber security plan has to be the recognition that you and your team need to be able to keep a secret. For instance the first secret is of course to keep any passwords you have been given access …
Back to Basics – The Collection.
This week the Wednesday Bit is about is highlighting some of the mini-series and back to basics cyber security primers I have written. Why? Because yesterday when I was speaking with a long-term client about password hygiene in their organisation, they were unaware I had a Password Primer they could …
If Microsoft can get it wrong…
It has emerged that senior executives at Microsoft had their emails hacked and monitored by Russian threat actors for nearly 2 months. Microsoft network breached through password-spraying by Russian-state hackers | Ars Technica The attack was not sophisticated. The threat actors – Midnight Blizzard – using nothing more than a …
Credential Theft
If Have I Been Pwned have these credentials then you can bet that the threat actors have them as well. Have I Been Pwned adds 71 million emails from Naz.API stolen account list (bleepingcomputer.com) Your takeaway from this It is important you and your team understand the importance of any …
More about passwords…
On Monday I ran a post about passkeys and the end of the password – but of course that is the future of cyber security, today we still depend on passwords. We all know a good password is a combination of upper and lower case letters with numbers and some …