You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …
Keep It Simple… Encryption (pt. 1)
Today we are going to look at one of the quickest ways any organisation (that uses Microsoft 365) can enhance its cyber security – encryption. Why encryption? I was leading a Cyber Security Awareness course last week and one of the first things we discussed was best practice when it …
Is Microsoft and New Outlook being “reasonable”?
Here is an interesting story about the new Microsoft Outlook app spying on you – well not on me I do not use it. It comes from a source that I am unfamiliar with, but it was referenced by Bruce Schneier, a source I respect. Outlook is Microsoft’s new data …
Continue reading “Is Microsoft and New Outlook being “reasonable”?”
Why the “Principle of Least Privilege” works and something for free…
The Principle of Least Privilege (PoLP) is a fundamental concept in cybersecurity. It ensures that users are granted only the minimum necessary access rights required to perform their job functions. This principle is one I always enforce in cyber security as it is a powerful way of defending the most …
Continue reading “Why the “Principle of Least Privilege” works and something for free…”
See what Bruce Schneier has to say about Microsoft spying on you!
Most days I read what Bruce Schneier has to say, I have also seen him speak and bought (and quoted from) his books. This piece is short and to the point: Microsoft Is Spying on Users of Its AI Tools – Schneier on Security Your takeaway Sometimes you just have …
Continue reading “See what Bruce Schneier has to say about Microsoft spying on you!”