Not All Logins Are Created EqualEvery user login is effectively a key to your organisation’s data and systems, though unlike a physical key you don’t need to take an…Jan 15, 2021Jan 15, 2021
Third Party Supply Chain RisksCan you trust your penetration testing company with your results, or are they inadvertently performing the initial reconnaissance for…Nov 2, 2020Nov 2, 2020
Web domain registrars have a lot to answer for!Back in September I received an email claiming to be from the courier firm DPD and that an attempt to deliver a parcel was unsuccessful…Oct 21, 2020Oct 21, 2020
Why I Won’t Phish My Own StaffAs part of the cyber security awareness training for many organisations, the IT department simulates phishing emails via a third party…Sep 29, 2020Sep 29, 2020
Battling Software Update FatigueFor over 20 years we have been on a never-ending cycle of being told that the software we use has bugs or security issues and that it has…Jul 23, 2020Jul 23, 2020
The smallest step in GDPR complianceThe GDPR legislation at 57,500 words long is not the easiest of things to get your head around if your business processes personal data…Jul 22, 2020Jul 22, 2020
A Question of TrustEverything we do online is based on trust, we trust our email providers, our cloud services, our search engines, software developers …Jun 10, 2020Jun 10, 2020
Why Targeted Email Attacks WorkTargeted email attacks are an increasingly difficult problem to stop through technology alone, requiring both processes and people (via…May 19, 2020May 19, 2020
Is cybersecurity awareness training worth the bother?Cybersecurity training in many organisations is seen as chore, a tick box exercise that needs to be done when we get time, maybe next week…May 13, 2020May 13, 2020
Why Criminals Want To Give You Virtual MoneyOver the past few years there has been a paradigm shift in the world of computer gaming, whether on a consoles, computers and mobile…May 12, 2020May 12, 2020