I have written another article on our Cyber Security Awareness Training site, CyberAwake, looking at another aspect of password – in this case how sharing credentials can seriously compromise your cyber security: Credential Sharing and Passwordless – CyberAwake
Let’s get ready to dump passwords
If we did not use passwords, then the world would probably be a more secure place. Why? Read on: Something better than a password – Passwordless Authentication – CyberAwake
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
CISA adds a software development tool vulnerability to the Known Exploited Vulnerabilities Catalog and security advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability for Telerik, a software development tool, to it’s Known Exploited Vulnerabilities Catalog: CISA Has Added One Known Exploited Vulnerability to Catalog | CISA This week CISA also released a security advisory for a range of Apple products, …
Do you know what an Excel XLL file is? The hackers do.
An Excel XLL file is a an add-in file that allows third parties to add extra functionality to Microsoft Excel – pretty useful. But of course the threat actors have extended that third party functionality to include malware. Now, just like with macros, Microsoft is blocking XLL files, originating from …
Continue reading “Do you know what an Excel XLL file is? The hackers do.”