Dodgy extensions and not a builder in sight.

A lot of normal people might think about the phrase “dodgy extensions” and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse.

Read More

Upcoming Public Training Schedule

Training Schedule

The following is the training schedule for publicly accessible courses or speaking events that are being provided by the team at L2 Cyber Security Solutions. Please click on the Book Here link to secure a place.

Read More

Holiday Data Breach Photos.

Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they’ve been and the nice food they’ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above.

Read More

Eir laptop theft – could have been worse

The eir laptop theft that was revealed this week was pretty … actually … it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse!

Read More

Sextortion scam – a follow up.

Sextortion scam follow up

This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.

Read More

Identity theft enabled by fun quizzes.

What is your identity theft name

If you are on social media, you will no doubt have come across those fun quizzes. You know the ones, “What’s your Westeros name?” or “What was the number 1 song the day you were born?”

Read More

VPN Logs. Should you be concerned?

VPN logs

I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service?

Read More

Data breach video series – CCTV Leakage

Data Breach CCTV Leakage

Data Breach CCTV Leakage. This short video talks about how allowing CCTV footage to be leaked online is a serious data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Open Plan Office

Data Breach Open Plan Office

Data Breach Open Plan Office. This short video talks about how having a public space near to an open plan office may lead to a data breach under the #GDPR. A breach may arise where your staff are speaking to other staff or to people on the phone and they are speaking items of personal…

Read More

Data breach video series – Sharing a Password

Data Breach Sharing a Password

Data Breach Sharing a Password. This short video talks about how simply sharing your password could be a data breach under the #GDPR. This is because, by giving somebody your password, you are giving them access to everything that you have access to. If you are authorised to access certain personal data, which they are…

Read More

A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. 

Read More

Data breach video series – Personal data on display

Date Breach Personal data on display

Date Breach Personal data on display. This short video talks about how simply leaving somebody’s personal data on display in a public place is a data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Who’s been reading your Gmail?

Who's been reading your Gmail

For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…

Read More