A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. 

Read More

Who’s been reading your Gmail?

Who's been reading your Gmail

For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…

Read More

Data breach video series – Ransomware

Data Breach Ransomware

Data Breach Ransomware This short video talks about how being affected by #Ransomware is actually classified as a data breach under the #GDPR. You will need to check to see if the data has been accessed by the evil doers and if so, you will need to notify the Data Protection Commissioner. For more information…

Read More

Upcoming Public Training Schedule

Training Schedule

The following is the training schedule for publicly accessible courses or speaking events that are being provided by the team at L2 Cyber Security Solutions. Please click on the Book Here link to secure a place.

Read More

Data breach video series – Shredding left out

Data Breach Shredding left out

Data Breach Shredding left out This short video talks about how leaving out straight cut shredding for the bin men is a data breach under the #GDPR. This is because straight cut shredding is not actually securely destroyed. It can be re-assembled like a jig saw. For more information or to contact us please visit…

Read More

Data breach video series – Unrestricted USB stick use

Data Breach Unrestricted USB stick use

Data Breach Unrestricted USB stick use This short video talks about how unrestricted access to USB Memory sticks can lead to a potentially massive data breach under the #GDPR, as you could be unaware of people copying data to these devices. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Use of the To field on e-mail

Data Breach Use of the To field on e-mail This short video talks about the inappropriate use of the “To” address field to send e-mails to groups of people who should not know the others e-mail addresses. This will quite likely be a data breach under the GDPR. For more information or to contact us…

Read More

Data breach video series – mobile device loss

Data Breach mobile device loss

Data Breach Mobile Device Loss This short video talks about the implications of mobile device loss as a data breach under the GDPR. For more information or to contact us please visit our website and specifically our GDPR section.

Read More

Data breach video series – introduction

Data Breach introduction

Data Breach Introduction: This is the introduction to a series of short videos discussing different types of data breach under the GDPR. For more information or to contact us please visit our website and specifically our GDPR section.

Read More

MyFitnessPal Breach – Bigger than Equifax

MyFitnessPal Breach

The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website’s owner, reported the breach yesterday. 

Read More

Cambridge Analytica were nosey ninnies

Cambridge Analytica and Facebook

Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. 

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. 😏

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not the website doing the money generation and you are not the beneficiary. The bad guys are! 😨

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.

Read More