We all depend on the various technical cyber security solutions we deploy, firewalls, anti-virus, end point detection and response (EDR), there are many names and the threat actors know we depend on them. So it should come as no surprise that there are attacks, that first attempt to disable these …
Keep control of your information
I have implemented information control for one-person organisations – because even a small organisation will have some need to share information with other people and organisations. It is an essential step in any IT and Cyber Security Audit to examine who, has access to what information and what steps are …
Microsoft Patch Tuesday – June 2024
Yesterday was the second Tuesday of the month that means our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. Our team will keep an eye on the reports for the next day or two to check there …
Credentials are King
Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …
Microsoft Patch Tuesday – May 2024
Yesterday was the second Tuesday of the month that means our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. Our team will keep an eye on the reports for the next day or two to check there …