Detecting Ransomware – Ransomware Part 4
Ransomware will not stop – the threat actors just make too much money from it. It does not matter what … Read more
Ransomware will not stop – the threat actors just make too much money from it. It does not matter what … Read more
Last time I wrote about the advantages of a passwordless environment and how opting into passwordless authentication would benefit your … Read more
I wrote about the Microsoft back and forth over disabling Microsoft Office macros last year and the risk that the … Read more
Credential stuffing cyber attacks depend on one crucial mistake by the user – they just need to use the same … Read more
Thanks to Microsoft and their “Patch Tuesday” which has officially been running since October 2003, the second Tuesday of the … Read more
Although there are Big Tech CEOs (Rushe, 2022) and Conservative ex-ministers (Ambrose, 2022) who do not like their subordinates working … Read more
We have all seen redacted documents – even if it is just in a movie a TV programme or on … Read more
I was away on leave last week so you would think I was not thinking about phishing emails and cyber … Read more
This article is carrying on from last week’s article, Something You Know, Something You Have or Something You Are, which … Read more
We are going to take a break from the insider threat for a couple of weeks – I am working … Read more