On Monday I ran a post about passkeys and the end of the password – but of course that is the future of cyber security, today we still depend on passwords. We all know a good password is a combination of upper and lower case letters with numbers and some …
Where do they hide that malware…
…in a game of course. Shall We Play a Game? – SANS Internet Storm Center There are hundreds of thousands of these free simple games available out there on the internet but some of them are not quite what you think they are. I am not against fun – especially …
Patch your Apple Stuff
Apple has released updates for iOS, iPadOS, macOS, tvOS and watchOS. Even if you have automatic updates enabled it is always worth checking that the updates have completed – for the updates to work on some devices you need to have them on charge and on WiFi and if you …
QR Code Attacks
One of our IT clients suffered a minor QR Code attack, when they discovered that their QR code they had displayed in their window had been covered, outside the glass, by another code on a sticker. This code pointed to a Facebook page for a local music gig – so …
The anatomy of a phishing email
Phishing email cyber-attacks have to be the most common cyber-attack directed at any organisation. Most are trying to get the victim to reveal their credentials, often for Microsoft 365. Every week I spend time with clients discussing or investigating phishing emails and helping them put systems in place to help …