Cyber Security Kill Chain

In our recent blog post "Multi-Phase Cyber Attacks" we described how cyber attacks are often not a single instance but part of a planned attack that can be sustained over several months, even years. An attack may only become apparent when the cyber attacker makes themselves known through some form of visible attack, a security... Continue Reading →

Risks Associated with Ghost/Inactive Accounts

Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people's contentAn inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a variety... Continue Reading →

Flash Player Now Disabled

Starting 16 January 2021, Flash Player is officially dead and any current installations will block the playing of any Flash content. Adobe ceased to support Adobe Flash Player as of 31 December 2020 and all download pages from their website have been taken down. Why is this happening? Adobe Flash Player is a legacy multi-media... Continue Reading →

A Review of 2020

As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China... Continue Reading →

COVID-19 Vaccine Scam

Updated 16 January 2021 Never let a good crisis go to waste - at least this is what Cyber criminals and Scammers have been doing all this year in relation to the COVID-19 pandemic. There have been multiple scams and cyber attacks relating to the pandemic (we will review some of them in our 2020... Continue Reading →

Threat & Incident Lifecycle Management

It is a good investment to invest in a Threat & Incident Lifecycle Management Procedure since cyber threats show no sign of slowing down. This post is focused on what organisations can do to detect cyber threats, but this will also be useful for individuals and consumers. What is Threat & Incident Lifecycle Management? The... Continue Reading →

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network - namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot... Continue Reading →

Cyber Security during a Pandemic

Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people's fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals... Continue Reading →

Using Wearable Technology Safely – A Pocket Guide

We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kindFitness TrackersGPS TrackersEar buds/headphones particularly... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

Create a website or blog at WordPress.com

Up ↑