Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …
Another thing about phishing emails… (pt.12)
A few months ago, I wrote a Back-to-Basics mini-series on phishing emails, how they impact organisations and what you can do to reduce the risks. Back-to-Basics – A Phishing Email Primer | Smart Thinking Solutions Phish Attacks – the deluge never stops Every week I read articles on the latest …
Continue reading “Another thing about phishing emails… (pt.12)”
Stuff happens
On September 4, Tewkesbury Borough Council declared a major IT incident and shut down its systems and enacted their incident response plan. It now turns out that this incident was not a cyber-attack but an error in user accounts. However this does not matter. There was and is inconvenience to …
Ransomware has not gone away
Just in case you thought that ransomware was a thing of the past or that the threat actors only went after big businesses, then think again: NoName ransomware gang deploying RansomHub malware in recent attacks (bleepingcomputer.com) The NoName ransomware gang has been targeting small and medium-sized businesses worldwide with its …
Forced Upgrades
It is nothing new for me to say that patches and upgrades are an essential step in any organisation’s cyber security plan. Threat actors actively go after any system that has a weakness as soon as they know about it – many times before a vendor even knows there is …