Here are a couple of examples from the recent cyber-tech press of examples of software vulnerabilities that need patching… Promptly! Microsoft releases Exchange hotfixes for security update issues – BleepingComputer ArcaneDoor hackers exploit Cisco zero-days to breach govt networks – BleepingComputer The first illustrates that management is needed as not …
Encryption – A Primer
Over the past couple of weeks, I have been writing a short series looking at the basics of encryption, how you can use it to improve your cyber security and some of the issues you need to address if you are using it. As I have done with other mini-series …
Fake cheat codes should get you thinking about your hybrid workers
I am never popular when I am helping organisations create cyber security plans and I insist that company laptops are only for company business. This applies double when the laptop is used at home or on holiday – you cannot let your significant other or others use the company computer. …
Continue reading “Fake cheat codes should get you thinking about your hybrid workers”
It is a while since I have written about Ransomware
Once ransomware gets into an organisation, usually through some type of phishing attack, that organisation will have a problem that will cost it money and will damage its reputation. So, anything that makes it easier for ransomware attacks to flourish and increase has to be bad news for every organisation …
Continue reading “It is a while since I have written about Ransomware”
Keep It Simple… Encryption (pt. 4)
You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …