Over the past couple of weeks, I have been writing a short series looking at the basics of encryption, how you can use it to improve your cyber security and some of the issues you need to address if you are using it. As I have done with other mini-series …
USB cyber-attack – Device Security (Pt. 4)
I thought I was done with device security for the time being – but then, of course, I got a question from a client. “What about USB drives?” Rather than write a completely new article let me reprint an article I wrote for CyberAwake looking at USB storage security – …
Continue reading “USB cyber-attack – Device Security (Pt. 4)”
What the “Principle of Least Privilege” does for you? (pt. 1)
This article follows on from last week’s Why the “Principle of Least Privilege” works and something for free…. If you want the something for free, then you had better read that article first! Let’s start with a simple definition. The Principle of Least Privilege (PoLP) is a fundamental concept in …
Continue reading “What the “Principle of Least Privilege” does for you? (pt. 1)”
Devices and Cyber Security – A Primer
I have written a number of articles over the past few weeks about how organisations need to be thinking about theirs’s and their employee’s devices and cyber security. Device Security (Pt. 1) Device Security (Pt. 2) Device Security Just One More Thing… When hardware reaches EOL – Device Security The …
Why the “Principle of Least Privilege” works and something for free…
The Principle of Least Privilege (PoLP) is a fundamental concept in cybersecurity. It ensures that users are granted only the minimum necessary access rights required to perform their job functions. This principle is one I always enforce in cyber security as it is a powerful way of defending the most …
Continue reading “Why the “Principle of Least Privilege” works and something for free…”
