Simple Overview of IoT

I came across a tweet recently from NIST Cyber Security (US National Institute of Standards and Technology Cyber Security Division) that gave a very good summary of what the Internet of Things (IoT) is, the threats and what is being done to help mitigate them. "NIST (@NIST) tweeted at 10:54 pm on Fri, Oct 04,... Continue Reading →

Using Cloud Services Safely

Whether or not you realise it, we all use the cloud for something in our daily lives. In this blog I want to explain in simple terms what 'The Cloud' is and how you can apply some simple safeguards to secure your use of it. What is the Cloud - a History Lesson? Lets go... Continue Reading →

Combating Social Engineering

Social Engineering is a form of cyber attack where the physiological manipulation of people to trick them into divulging confidential information that can be used to hack into websites and other computing resources. There are various forms of social engineering: Baiting Impersonating PharmingPhishingSmishingSpear FishingTailgatingVishing Water HolingWebsite CloningWhaling. Lets take a deeper look at these. Baiting... Continue Reading →

Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Electronic Payments

When was the last time you paid for a transaction in cash? We all use electronic forms of payment these days, and in some cases people just don't carry cash anymore. So, what are the various forms of electronic payments we use? The following are the usual examples: Credit/Debit Cards (in person or online)Direct Debit... Continue Reading →

Create a website or blog at WordPress.com

Up ↑