“inventory stock” for Facebook, is you!
Read More: “inventory stock” for Facebook, is you!But you know that already! Interesting comparison in the linked article below and somewhat equivalent , though the post “person” selling our private information could not go as far as Facebook has been able to unhindered. In my opinion it is not that my data is being sold which is an issue, it is the…
Empathy in cyber security
Read More: Empathy in cyber securityEmpathy, the ability to understand the feelings of others as if we are in their shoes. Have we as cyber security professionals really thought that the target of a Malware attack is not us when we evaluate our cyber security posture? It is almost never the business leader or the person reading these articles that…
The problem is NOT Cyber security!
Read More: The problem is NOT Cyber security!The “Compliance with the NSW Cyber Security Policy” special report released on the 28th October 2021 should be a serious concern to every NSW resident who has their Personally Identifiable Information being “securely” held by a government agency. Vic, NSW, QLD, SA, NT and TAS could very likely be transposed with NSW and these findings…
Hyperbole – Cyber incident response
Read More: Hyperbole – Cyber incident responseHyperbole (love the word!) ….. I would be disappointed if my business leaders thought that my security team could not respond to a cyber incident. The linked article describes that business leaders do not feel their organisation could respond to a cyber incident. So what is the problem? The article is not an accurate impression?…
Data Incontinence – when leaks sneak out
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Read More: Data Incontinence – when leaks sneak outTo prevent data being used against you in the future either through competitive, intellectual or malicious usage or publication? What should you do?
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Advanced Managed Detect Response (AMDR)
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:⭐️⭐️⭐️
Read More: Advanced Managed Detect Response (AMDR)MDR stands for is the next generation of cyber security Detect and Response solutions in the market to target breaches and other malicious activity, eXtended Detection and Response XDR stood for an extended range of detection capability (Network and other devices/ sources of data) and AMDR will take over where XDR lets go.
CSF framework: 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:⭐️⭐️⭐️
Multi Factor Authentication
CSF framework: 2. Protect. Cyber Maturity Level:⭐️
Read More: Multi Factor AuthenticationIf your organisation does not use Multi Factor Authentication yet, then Read on and before you do anything else. Next ensure you get Multifactor authentication implemented ASAP for the sake of your job and your business. The Problem Passwords are not secure in isolation, they need to be remembered and they need to be changed…
CSF framework: 2. Protect. Cyber Maturity Level:⭐️
Business Email compromise
Read More: Business Email compromiseBusiness Email Compromise (BEC) is a Social engineering attack and one of the most likely to succeed and provide a large benefit for the attacker. I have a recent example with a conveyancer where their email footer stated “We will not request money via email” – well in their final email requesting funds they removed…
Customer ignores MSP advice and is breached?
Read More: Customer ignores MSP advice and is breached?In the case of ever increasing and tightening reporting requirements and breached clients potentially being sued for damages, it is your reputation as the MSP that will be affected in a blame game scenario.