Promoting Cyber Security and Privacy as an integral part of what we do.
Zero Trust Architecture
There has been a lot of talk recently about Zero Trust Architectures and what this means in the new ‘Work From Home’ approach being adopted by companies during the pandemic.
Zero Trust, Zero Trust Network, or Zero Trust Architecture refer to security concepts and threat model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access.
We are preparing a series of blogs on this subject, but in the meantime please view this short video from Hacker Combat and review the blogs we have picked below.
A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems… Continue Reading →
Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →
The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network – namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot… Continue Reading →
This is an extension to my blog Productive and Secure Remote Working and Cyber Security during a Pandemic where I just want to describe an emerging cyber threat relating to home working and in particular remote desktop access. When we are in the office we are protected by a number of systems and firewalls. Our individual PC’s… Continue Reading →
Your connection to the Internet is the most vulnerable part of your online existence. It is on the edge of your network and is the front facing interface to all the major cyber threats. In particular the following common threats exist and take advantage of badly configured routers: Default settings passwords allowing someone to hack… Continue Reading →
Over the past few weeks, we have all had to consider working from home (no need to say why unless you have been living under a rock). This guidance post is about how you can work from home securely and productively. Setting up the Environment Ideally you need a room you can yourself up in,… Continue Reading →
Loading…
Something went wrong. Please refresh the page and/or try again.