Threat & Incident Lifecycle Management

It is a good investment to invest in a Threat & Incident Lifecycle Management Procedure since cyber threats show no sign of slowing down. This post is focused on what organisations can do to detect cyber threats, but this will also be useful for individuals and consumers. What is Threat & Incident Lifecycle Management? The... Continue Reading →

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network - namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot... Continue Reading →

Cyber Security during a Pandemic

Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people's fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals... Continue Reading →

Using Wearable Technology Safely – A Pocket Guide

We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kindFitness TrackersGPS TrackersEar buds/headphones particularly... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

1 Year Anniversary

On the 30th December 2018 we published our inaugural post on this site. For those who weren't following us at this point, this was a A Review of Cyber Security in 2018. We will be publishing a similar review just before New Year 2019 as a means to re-enforce the lessons learnt from the failings in... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Virtual Private Networks

We have all seen the adverts on TV, and in the media in general, around how a Virtual Private Network (VPN) will secure your web browsing, and make your connection totally private. Well, I hate to say this, but this is not totally true. So, what is a VPN? We need to first of all... Continue Reading →

Domain Typo Squatting

I would like you to take a look at the following web address: What do you see? Do you see microsoft.com? You would be very wrong if you did. Zoom in on the above picture. This address is actually RNICROSOFT.COM and not the address you first thought of. UNDER NO CIRCUMSTANCES GO TO ANY ON... Continue Reading →

Create a website or blog at WordPress.com

Up ↑