shutting down a phishing site
Read More: shutting down a phishing sitePhishing is one of if not the highest success rate cyber security attacks that we are likely to suffer. According to the FBIโs Internet Crime Complaint Centre (IC3), phishing accounted for 30,48% ofย all received complaints in 2020, making it the area with the highest victim count. https://www.techradar.com/author/fernando-cassia Being that most of my readers have an…
Human error, human error, ho hum…
Read More: Human error, human error, ho hum…Do the easiest(cheapest) thing first that give your the biggest benefit or the first 80% of a job takes 20% of the time, both statements lead to a conclusion that it is most efficient to work on what is going to be most affordable and easy first. The article I have linked reports that the…
Single Sign On (sso)
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธ
Read More: Single Sign On (sso)redentials, that credential is able to be used by each system querying a central system (Authentication service) to provide the user access to a service or system. This is different from a Password manager or “Screen Scraping” where a user name and password is “replayed” into the session.
CSF framework: 1. Identify; 2. Protect. Cyber Maturity Level:โญ๏ธโญ๏ธ
101 Cyber security primer
Read More: 101 Cyber security primerCyber Security assessments are critical to understanding where your organisation is maturity wise.
Data Leakage Protection, preventing loss of data
CSF framework: 1. Identify; 2. Protect; 3. Detect; Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธโญ๏ธ
Read More: Data Leakage Protection, preventing loss of dataWho owns the Data? does the business expect SecOps or IT to manage? (Hint: very often “yes”) Where is the budget for managing the DLP solution coming from after implementation? Is the business going to accept the inconvenience of DLP rules “upsetting” their daily workflows” Will the business get sufficient value from the ongoing investment…
CSF framework: 1. Identify; 2. Protect; 3. Detect; Cyber Maturity Level:โญ๏ธโญ๏ธโญ๏ธโญ๏ธ
Starting out – New Security officer
Read More: Starting out – New Security officerStarting out with an organisation and don’t know where to start?
Business Email compromise
Read More: Business Email compromiseBusiness Email Compromise (BEC) is a Social engineering attack and one of the most likely to succeed and provide a large benefit for the attacker. I have a recent example with a conveyancer where their email footer stated “We will not request money via email” – well in their final email requesting funds they removed…
Customer ignores MSP advice and is breached?
Read More: Customer ignores MSP advice and is breached?In the case of ever increasing and tightening reporting requirements and breached clients potentially being sued for damages, it is your reputation as the MSP that will be affected in a blame game scenario.
91% of Cyber Attacks are Email initiated!
Read More: 91% of Cyber Attacks are Email initiated!91% of Cyber Attacks start with email according to Microsoft, yet email is the least exciting area for us to focus our Cyber security efforts in. Quote from The Register (ignore the sarcasm): “That being the case, why is Microsoft bothering to sound the alarm? Well, 91 per cent of all cyberattacks originate with email, according to…