Detecting Ransomware – Ransomware Part 4
Ransomware will not stop – the threat actors just make too much money from it. It does not matter what … Read more
Ransomware will not stop – the threat actors just make too much money from it. It does not matter what … Read more
Planning and Preparation – RANSOMWARE PART 2* Following my article last week, where we looked at the important role “coffee**” … Read more
Last time I wrote about the advantages of a passwordless environment and how opting into passwordless authentication would benefit your … Read more
Passwordless As promised passwordless authentication or “passwordlessness”. I think I may have made that word up – but it conveys … Read more
I wrote about the Microsoft back and forth over disabling Microsoft Office macros last year and the risk that the … Read more
Credential stuffing cyber attacks depend on one crucial mistake by the user – they just need to use the same … Read more
Today we are talking About Links. How realistic is the advice “don’t click on that link”? How many times in … Read more
Working from Anywhere and Business Email Compromise If you are looking for something lighter because it is Christmas, can I … Read more
Thanks to Microsoft and their “Patch Tuesday” which has officially been running since October 2003, the second Tuesday of the … Read more
Although there are Big Tech CEOs (Rushe, 2022) and Conservative ex-ministers (Ambrose, 2022) who do not like their subordinates working … Read more