How do you spot a malicious Word document?
The main problem with this question, is that that the threat actors, (that is newspeak for hackers), work hard to … Read more
The main problem with this question, is that that the threat actors, (that is newspeak for hackers), work hard to … Read more
There is only so much budget for your cyber security, so where you spend it needs to give you the … Read more
Let’s start this post by outlining what I mean by AAA: Authentication – Authorisation – Accountability Authentication. For even the … Read more
Following my blog on Tuesday about VPNs and security when “working anywhere”, including on holiday, here is a revised version … Read more
Before heading out on our leave, we all use that handy feature in our email – the Out-of-Office (OOO) auto-reply … Read more
NCSC and the ICO say – Don’t pay the malware ransom. A couple of weeks back The National Cyber Security … Read more
It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and … Read more
“Everyone in any organisation has a role to play in the cyber security planning and implementation for that organisation, so … Read more