What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …
Hacking is not just data theft and ransomware – it can be reputation damage. Some advice about your WordPress website and your reputation.
Fast Company an American magazine was hacked and abusive articles added to its news feeds, resulting in this material getting a wider audience through syndication on the Apple News app. The Apple News channel was quickly disabled and Fast Company took its site down pending a fix but the damage was …
Cyber Security and Paper!
I have just published an article over on our online training site, CyberAwake, about how you start a cyber security review and then how paper becomes a significant step in that process: Where are the boundaries for your cyber security? – CyberAwake
Do you have a Samsung device?
Samsung suffered its second major data breach of 2022, but the details it is releasing are few and far between. There is some excuse about it being a holiday weekend or the data being of low value. Impact of Samsung’s most recent data breach unknown | TechRepublic I am sure …
Advice if you must use USB portable storage
Sometimes the easiest and best storage for your workflow, is a portable USB memory stick and the one thing that gives us a headache when we are carrying out a cyber security survey is the use of portable USB memory sticks! Do you want too why? Then hop over to …
Continue reading “Advice if you must use USB portable storage”