It is so easy to forget about those boxes in the cupboard, that your organisation depends on. I often find routers, switches and other devices left off my initial investigation document when I start an IT and Cyber Security Audit. Here is the reason why you must make sure they …
More pain for Microsoft and something free for you
Hot on the heels of “New Outlook – Surveillance in the name of profit” comes a report from the US Government’s Homeland Security on how Microsoft handled the 2023 Exchange Online cyber attack. Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack (bleepingcomputer.com) Whatever Microsoft says about …
Continue reading “More pain for Microsoft and something free for you”
It is a month to our webinar…
We are privileged to have John O’Mahony, one of the keynote speakers from the Connect London 2023 conference, coming to speak to us, our clients and guests about how smaller organisations can now access corporate level 24/7 continuous cyber security – for a surprisingly low cost per head. John is …
What the “Principle of Least Privilege” does for you? (pt. 1)
This article follows on from last week’s Why the “Principle of Least Privilege” works and something for free…. If you want the something for free, then you had better read that article first! Let’s start with a simple definition. The Principle of Least Privilege (PoLP) is a fundamental concept in …
Continue reading “What the “Principle of Least Privilege” does for you? (pt. 1)”
Why the “Principle of Least Privilege” works and something for free…
The Principle of Least Privilege (PoLP) is a fundamental concept in cybersecurity. It ensures that users are granted only the minimum necessary access rights required to perform their job functions. This principle is one I always enforce in cyber security as it is a powerful way of defending the most …
Continue reading “Why the “Principle of Least Privilege” works and something for free…”