Jan 15, 2021Not All Logins Are Created EqualEvery user login is effectively a key to your organisation’s data and systems, though unlike a physical key you don’t need to take an existing key to a locksmith or key cutting service to make new keys. Instead, logins can be created by anyone who has administrator rights to the…Cybersecurity3 min readCybersecurity3 min read
Nov 2, 2020Third Party Supply Chain RisksCan you trust your penetration testing company with your results, or are they inadvertently performing the initial reconnaissance for cyber criminals, with you picking up the bill to boot? Whether from an insider threat or remote access trojan, penetration testing (pen test) companies are an ideal target for cyber criminals…Penetration Testing4 min readPenetration Testing4 min read
Oct 21, 2020Web domain registrars have a lot to answer for!Back in September I received an email claiming to be from the courier firm DPD and that an attempt to deliver a parcel was unsuccessful. In order to get the item redelivered I would need to reschedule the delivery and confirm the address details are correct. Unfortunately as there had…Phishing3 min readPhishing3 min read
Sep 29, 2020Why I Won’t Phish My Own StaffAs part of the cyber security awareness training for many organisations, the IT department simulates phishing emails via a third party service to help educate their users and report on who is more likely to click on a phishing email. Some of these third party phishing services are even free…Phishing3 min readPhishing3 min read
Jul 23, 2020Battling Software Update FatigueFor over 20 years we have been on a never-ending cycle of being told that the software we use has bugs or security issues and that it has been fixed in an update or patch. But those updates have had a tendency of breaking something else, and the whole cycle…Updates4 min readUpdates4 min read
Jul 22, 2020The smallest step in GDPR complianceThe GDPR legislation at 57,500 words long is not the easiest of things to get your head around if your business processes personal data (for which the majority do). …Gdpr2 min readGdpr2 min read
Jun 10, 2020A Question of TrustEverything we do online is based on trust, we trust our email providers, our cloud services, our search engines, software developers and online stores. We give them personal and financial information, ranging from our pet’s names and first school, to our credit cards and bank details. So, as a result…Cybersecurity3 min readCybersecurity3 min read
May 19, 2020Why Targeted Email Attacks WorkTargeted email attacks are an increasingly difficult problem to stop through technology alone, requiring both processes and people (via education) to effectively combat. …Phishing3 min readPhishing3 min read
May 13, 2020Is cyber security awareness training worth the bother?Cybersecurity training in many organisations is seen as chore, a tick box exercise that needs to be done when we get time, maybe next week. Or it is mandatory, regardless of the deadlines you face, but mostly irrelevant to your role or to risks the organisation faces. …Cybersecurity3 min readCybersecurity3 min read
May 12, 2020Why Criminals Want To Give You Virtual MoneyOver the past few years there has been a paradigm shift in the world of computer gaming, whether on a consoles, computers and mobile devices, where the focus is no longer on just selling you a game. Instead, the focus has shifted on you buying an in-game currency or virtual…Cybersecurity3 min readCybersecurity3 min read