Last week I had a prospective client take me up on our free 30 minute “ask me anything about your cyber security” Teams meeting. Things went well, she had some questions, I ran through my advice checklist with her – everyone was happy until I asked about their anti-virus – …
Another improvement in Android security
I have written about the difference between Apple iOS cyber security and Android OS security before. In my opinion, Apple has the edge for a variety of reasons: But Android is catching up… Recently Google has taken a number of steps to improve the cyber security of Android devices: A …
Don’t Blame your Team – “Just Click Here”
Today we are talking About Links and here are a couple of questions to get us going on the topic: How realistic is the advice “don’t click on that link”? How many times in the day do you need to click on a link to do your work? Now I …
Continue reading “Don’t Blame your Team – “Just Click Here””
Delivery Scam
My personal delivery scam. I was working at my desk the other day, thinking about stopping for lunch, when I got the following text message: Now I was waiting for a delivery, I had ordered a camping kettle from AliExpress, but the last time I looked it was not scheduled …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …