Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …
Microsoft Patch Tuesday – May 2024
Yesterday was the second Tuesday of the month that means our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. Our team will keep an eye on the reports for the next day or two to check there …
The fast track for better cyber security
Modern cyber security tools are well within the budget of even the smallest organisations- even one person businesses. We have a webinar this week to tell you how. This article will give you some background it includes a link to sign up for either the webinar or to get the …
The Principle of Least Privilege and Authentication, Authorisation and Accountability – A Primer
Authentication, Authorisation and Accountability (AAA) and The Principle of Least Privilege (PoLP) come together in this primer to give you a basic understanding of the importance of knowing who is accessing your information and how much they can access. Another important idea covered here is what happens when something goes …
SharePoint – More pain for Microsoft but we still have a free gift for you…
It is never a good cyber security story, when I read there is a security issue with SharePoint – I have written many cyber security plans that depend on the integrity of Microsoft and SharePoint. New SharePoint flaws help hackers evade detection when stealing files (bleepingcomputer.com) Audit logs are a …
Continue reading “SharePoint – More pain for Microsoft but we still have a free gift for you…”