era is over – inventor of the ZX spectrum gone
Read More: era is over – inventor of the ZX spectrum goneSir Clive Sinclair has died on the 16/09/2021, Sir Clive created many innovative products over his lifetime including Calculators, Electric Vehicles, Micro TV’s etc and while I only used his computers briefly, it very sad to see him gone, another pioneer has moved on from this world. As I grew up in the 1970s and…
Anonymous?
Read More: Anonymous?Anonymising data is not anonymous data, nowadays many data providers are claiming that our data will be used anonymously by removing uniquely identifiable markers from the details they collect from us. Unfortunately to de-anonymise data all that is needed is pointers that make you unique, take for example your GPS data which shows you travel…
How to: Thwarting ransomware according to Cert NZ
Read More: How to: Thwarting ransomware according to Cert NZRansomware at its most basic prevents a user or an organisation from accessing their data.
Artificial Intelligence – Managed Detection and Response
Read More: Artificial Intelligence – Managed Detection and ResponseTwo buzzwords applied to almost all Cyber Security companies products today are: Artificial Intelligence and Machine Learning or AI and ML. What exactly the AI or ML technology in these solutions and managed service offerings we consume are providing, is open to debate; as is the depth of implementation and integration. However there are great…
shutting down a phishing site
Read More: shutting down a phishing sitePhishing is one of if not the highest success rate cyber security attacks that we are likely to suffer. According to the FBI’s Internet Crime Complaint Centre (IC3), phishing accounted for 30,48% of all received complaints in 2020, making it the area with the highest victim count. https://www.techradar.com/author/fernando-cassia Being that most of my readers have an…
Human error, human error, ho hum…
Read More: Human error, human error, ho hum…Do the easiest(cheapest) thing first that give your the biggest benefit or the first 80% of a job takes 20% of the time, both statements lead to a conclusion that it is most efficient to work on what is going to be most affordable and easy first. The article I have linked reports that the…
Business Email compromise
Read More: Business Email compromiseBusiness Email Compromise (BEC) is a Social engineering attack and one of the most likely to succeed and provide a large benefit for the attacker. I have a recent example with a conveyancer where their email footer stated “We will not request money via email” – well in their final email requesting funds they removed…
Customer ignores MSP advice and is breached?
Read More: Customer ignores MSP advice and is breached?In the case of ever increasing and tightening reporting requirements and breached clients potentially being sued for damages, it is your reputation as the MSP that will be affected in a blame game scenario.
91% of Cyber Attacks are Email initiated!
Read More: 91% of Cyber Attacks are Email initiated!91% of Cyber Attacks start with email according to Microsoft, yet email is the least exciting area for us to focus our Cyber security efforts in. Quote from The Register (ignore the sarcasm): “That being the case, why is Microsoft bothering to sound the alarm? Well, 91 per cent of all cyberattacks originate with email, according to…