I have highlighted many scams that attempt to take advantage of the victims of tragedies or exploit those who wish to help – and Hurricane Ian is no exception. Here is the advice from CISA: Hurricane-Related Scams | CISA Only donate through recognised charity web sites not via emails or …
The Insider Threat and $250,000
What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …
Cold War spying is a long way from today’s cyber-espionage weapons but they both successfully stole information – #BeCyberSmart
This article comes via Bruce Schneier, and fits nicely into the Weekend Project – it is about security and has some connections to the posts we run here at Smart Thinking. Both Clive and I have attended Bruce Schneier speaking events, and through Clive’s links with Edinburgh Napier University have …
At last, the real issue when big (or small) companies get hacked and control of collected PII is lost…
If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …
Do you have a policy to securely dispose of your redundant equipment?
Or do you let your staff or IT Support sell it on eBay? $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned | Ars Technica We do not resell equipment we are charged with disposing of securely.
Travelling to the US?
I have given this advice to a number of clients who were heading for the United States, for both business and pleasure – do not carry any confidential data on your devices, laptops, phones, USB drives etc, as US Border Security can copy those devices without a warrant. If you …
Technology in Schools
I have a friend from the MSc course, who is a teacher here in the UK, and he is often caught by the schools very high security stance, when he is trying to teach cyber security to his students. Many of the legitimate sites and resources he wants access to …