Upcoming Public Training Schedule

The following is the training schedule for publicly accessible courses or speaking events that are being provided by the team at L2 Cyber Security Solutions. Please click on the date to book your place (where available).

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. 😏

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not the website doing the money generation and you are not the beneficiary. The bad guys are! 😨

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.

Read More

Sneaky Tax Refund e-mails

Tax refund scam

Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.

Read More

Meltdown and Spectre


You probably can’t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster.

Read More

What will 2018 bring?

will 2018 bring

So what will 2018 bring to us all in the areas of cyber security and data privacy/protection? I had a go at this predicting thing last year and you can see how I got on here.

Read More

Review of my 2017 predictions.

2017 Predictions

I don’t see many people who make predictions for the coming year actually come back to review what they predicted. I’m not one of those though, so here is my review. I’ve included the original text below in blue, but the full article for my 2017 predictions is here.

Read More

Simple Security Planner tool for EVERYONE!

Security Planner

I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.

Read More

Video – 6 Examples of a data breach

6 examples of a data breach

Something new for us this time. A short video blog. This showing 6 examples of a data breach under the GDPR. The 6 examples are: A Lost or Stolen Laptop Sending e-mail to the wrong person. Disposal of confidential papers. Sharing of a password. Allowing copying of files to USB memory keys. Sending an e-mail…

Read More

Password Sharing = Data Breach

password sharing

I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought “That’s not a good idea. This person needs to receive some security awareness training.” I even have a commandment for it.

Read More

Dodgy e-mail that looks legit.

Dodgy e-mail

I received a dodgy e-mail on my personal account yesterday. I’m surprised the GMail spam filters didn’t catch it and flag it for me. Like last weeks story, this message looked kinda plausible.

Read More