General Cyber Security

This is a general category where we will post articles that apply to Cyber Security in general and also articles that do not fit neatly into other categories.

Featured

Router Vulnerabilities

Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →


The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network – namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot… Continue Reading →

Keeping Safe Online – A Pocket Guide

Being online these days, especially in the current environment when so many people are working from home and outside the protection of the company network, we all need to be extra vigilant that we don’t click on a link to malware. This blog is going to go through a number of tips to keep you… Continue Reading →

Securing your Remote Desktop

This is an extension to my blog Productive and Secure Remote Working and Cyber Security during a Pandemic where I just want to describe an emerging cyber threat relating to home working and in particular remote desktop access. When we are in the office we are protected by a number of systems and firewalls. Our individual PC’s… Continue Reading →

Managing and Securing Data

We all have gigabytes of business and personal data that is held in a variety of formats. Do you know what data you have, if it is secured correctly and where it all is? This subject is of massive importance to companies, but is equally important to individuals since you have a trove of data… Continue Reading →

Securing your Internet Router – A Pocket Guide

Your connection to the Internet is the most vulnerable part of your online existence. It is on the edge of your network and is the front facing interface to all the major cyber threats. In particular the following common threats exist and take advantage of badly configured routers: Default settings passwords allowing someone to hack… Continue Reading →

Productive and Secure Remote Working

Over the past few weeks, we have all had to consider working from home (no need to say why unless you have been living under a rock). This guidance post is about how you can work from home securely and productively. Setting up the Environment Ideally you need a room you can yourself up in,… Continue Reading →

Cyber Security during a Pandemic

Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people’s fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals… Continue Reading →

Social Media Auditing & Reporting

It’s amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain… Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to “Help with Google search visibility“. Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all… Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for… Continue Reading →

Loading…

Something went wrong. Please refresh the page and/or try again.


Headline image provided by ShutterStock.

Create a website or blog at WordPress.com

Up ↑