Business Email compromise
Read More: Business Email compromiseBusiness Email Compromise (BEC) is a Social engineering attack and one of the most likely to succeed and provide a large benefit for the attacker. I have a recent example with a conveyancer where their email footer stated “We will not request money via email” – well in their final email requesting funds they removed…
Customer ignores MSP advice and is breached?
Read More: Customer ignores MSP advice and is breached?In the case of ever increasing and tightening reporting requirements and breached clients potentially being sued for damages, it is your reputation as the MSP that will be affected in a blame game scenario.
91% of Cyber Attacks are Email initiated!
Read More: 91% of Cyber Attacks are Email initiated!91% of Cyber Attacks start with email according to Microsoft, yet email is the least exciting area for us to focus our Cyber security efforts in. Quote from The Register (ignore the sarcasm): “That being the case, why is Microsoft bothering to sound the alarm? Well, 91 per cent of all cyberattacks originate with email, according to…
Pfizer up and win $90
Read More: Pfizer up and win $90$90 (at least) for completing a Pfizer survey…. amazing but how did they know I have just had my first Pfizer jab? It surely is not a coincidence, or is it? This is a classic Phishing attempt, using the knowledge that scammers have about us socially, in this case the biggest broadest brushiest brush that…
Data Protection as an afterthought
Read More: Data Protection as an afterthought8 Terabytes lost….. 14 Terabytes of data recovered from a data migration gone wrong….. that was called a deletion of data not a migration when I worked as a Sys admin or a “Career limiting move”. Considering that the parts of a data migration plan I would outline involve: 1. Assess what data needs to…
Employees vs Home owners
Read More: Employees vs Home ownersOr a look into the psychology I have written about this before and today I saw a question today on linkedin related (Thanks David) …….. But I ran out of words to post as a comment. I want to start by suggesting that often security officers and auditors do not think about the companies assets…
Teach your employees information security
Read More: Teach your employees information securityWhen it comes to securing an organisations digital assets there are several approaches to minimising the risk as there is no solving a moving target. One that is not given the priority is the most obvious and the largest source of risk to a business: people, that is you and me, we are idiots and…
Privilege access Management
Read More: Privilege access ManagementPrivileged Access Management, cyber attacks often still operate primarily on the premise that a logged in user has privileged access to their workstation or Laptop, this aspect has never changed despite platform providers ‘improving’ their security models over time.
Partnering done right
Read More: Partnering done rightResellers are ambulance chasers! They came into the deal after I had already sold the product to the customer and wanted to make money from my hard work, I’m the vendor sale rep, I know what the customer needed and I sold it! I’ve lost count of the number of times that I’ve heard words…