When Smart locks are too smart!
Read More: When Smart locks are too smart!larger than the problem itself?
You will be Attacked! What do you do?
Read More: You will be Attacked! What do you do?Cyber Security is a necessary part of your operation, no Cyber Security plan places your business at risk of being ruined, unlike traditional theft where a criminal needs to breach your physical office location. A Cyber Security attack from criminals is targeted across as many businesses as they can reach, searching for an easy victim,…
Artificial Intelligence?
Read More: Artificial Intelligence?Artificial Intelligence is not always Artificial Intelligence, every Cyber Security vendor selling solutions today is either putting an “using AI” sticker on their website, or they are investigating how they can use Artificial Intelligence “AI” and Machine Learning “ML”in their branding. It stands to reason as the terms are well on the incline of the…
Help! choose a vendor
Read More: Help! choose a vendorIn the Cyber Security industry there are no sure bets, large companies have revenue and legacy products to protect, which stifles innovation.
Insecure – MicroSoft Autodiscover
Read More: Insecure – MicroSoft AutodiscoverMicrosoft Exchange servers autodiscover function, configured by the wrong hands, is not secure! A systems administrator who incorrectly sets up their on-premise Autodiscover record could be assisting miscreants to slurp up credentials from an organisations users trying to connect to their corporate email account.
The cost of SSO?
Read More: The cost of SSO?A friend of mine recently posted this interesting article on adding Single Sign On for various vendor products (thank you Charles) and I wanted to share, primarily because it gives an insight into the ways that some vendors are gouging their customers for functionality that has a negligible cost for the vendor and in some…
End Point Protection (epp)
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️
Read More: End Point Protection (epp)Organisation type: All organisations need End Point Protection
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️
Data Incontinence – when leaks sneak out
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️
Read More: Data Incontinence – when leaks sneak outTo prevent data being used against you in the future either through competitive, intellectual or malicious usage or publication? What should you do?
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:⭐️⭐️