I have written about the difference between Apple iOS cyber security and Android OS security before. In my opinion, Apple has the edge for a variety of reasons: But Android is catching up… Recently Google has taken a number of steps to improve the cyber security of Android devices: A …
Don’t Blame your Team – “Just Click Here”
Today we are talking About Links and here are a couple of questions to get us going on the topic: How realistic is the advice “don’t click on that link”? How many times in the day do you need to click on a link to do your work? Now I …
Continue reading “Don’t Blame your Team – “Just Click Here””
Delivery Scam
My personal delivery scam. I was working at my desk the other day, thinking about stopping for lunch, when I got the following text message: Now I was waiting for a delivery, I had ordered a camping kettle from AliExpress, but the last time I looked it was not scheduled …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Pancakes and Cyber Security
I know it is not Wednesday – but here is the “Wednesday Bit” early because today is Pancake Day. Flipping Your Cyber Security: Lessons from Pancakes So, what can pancakes teach us about flipping your cyber security? Just like making the perfect pancake, keeping your business secure requires the right …