I use OneNote a lot – so I had to follow up on my previous post about OneNote attachments being used as an attack vector. OneNote has become the threat actors new choice of attachment probably because Microsoft closed the door on macro attacks. In the wild, Microsoft OneNote’ .one’ …
Ransomware Advice – The Bite Sized Mini-series
My ongoing ransomware advice mini-series, continued yesterday with part 2 being published on CyberAwake: A Bag of Spanners – Planning and Preparation I am publishing the series across all three of the blogs I regularly write for, Smart Thinking, Octagon Technology and CyberAwake – part 1 is available at Octagon …
Continue reading “Ransomware Advice – The Bite Sized Mini-series”
Even the biggest suppliers have outages
Microsoft’s Outlook.com email service has been and is suffering a series of outages that is impacting it’s users. This is not a common service used by business, however we do have some clients, who have a need to use this type of service ( I am not sure if they …
Do not help that insider threat
I have written another article on our Cyber Security Awareness Training site, CyberAwake, looking at another aspect of password – in this case how sharing credentials can seriously compromise your cyber security: Credential Sharing and Passwordless – CyberAwake
Let’s get ready to dump passwords
If we did not use passwords, then the world would probably be a more secure place. Why? Read on: Something better than a password – Passwordless Authentication – CyberAwake