This is a continuation of last week’s article that looked at stealth malware infection from a malicious phishing email. Phishing Emails I spend a lot of my time writing and talking about malicious phishing emails. It is the easiest attack vector into your organisation that a threat actor has access …
Infected and you didn’t even know it…
When I am delivering the cyber awareness training – and people relax, realising I really mean it when I say there are no stupid questions – I often get asked “how do I know if my computer was infected?”. Usually just before being asked about the length of a piece …
Linux for Business (Part II)
This is part 2 my article about Linux at Work – part 1 is over on Octagon Technology. You should read that first before continuing. This is the continuing story of a surplus Windows 8 hybrid notebook/tablet conversion to Linux… Cyber Security on Linux Mint This section is a bit …
Where do you keep that Incident Response Plan? (Ransomware Mini-series Part 8)
Throughout this ransomware mini-series and other articles I write I refer to important documents you should have, a Cyber Security Master Document, an Incident Response Plan, a Business continuity Plan etc.. Once you have created these documents you need to keep them somewhere and that is something you need to …
Continue reading “Where do you keep that Incident Response Plan? (Ransomware Mini-series Part 8)”
Ransomware – You need a Checklist
Part 8 of my Ransomware Mini-series looks at another aspect of “what if the worst happens”. Monday Morning Blues – A Ransomware Attack This message on your laptop when you start work on a Monday morning, is not the blues that can be washed away with a cup of coffee …