The Chinese hacking server hardware

Chinese hacking server hardware

You may have heard some pretty scary headlines or stories recently about a Bloomberg Businessweek article. This was about the Chinese hacking server hardware by implanting little “bugs” onto the main electronic boards of the servers.

Read More

How to deal with Ransomware.

Deal with Ransomware

I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident.

Read More

Vulnerable Shopping Carts lead to Credit Card breaches

Vulnerable Shopping Carts

You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more.

Read More

Individual’s Rights

GDPR individuals rights

The General Data Protection Regulation (GDPR) created some new rights for individuals and strengthens some of the rights that previously existed under the Data Protection Act 1988/2003.

Read More

Dodgy extensions and not a builder in sight.

A lot of normal people might think about the phrase “dodgy extensions” and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse.

Read More

Holiday Data Breach Photos.

Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they’ve been and the nice food they’ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above.

Read More

Eir laptop theft – could have been worse

The eir laptop theft that was revealed this week was pretty … actually … it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse!

Read More

Sextortion scam – a follow up.

Sextortion scam follow up

This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.

Read More

Identity theft enabled by fun quizzes.

What is your identity theft name

If you are on social media, you will no doubt have come across those fun quizzes. You know the ones, “What’s your Westeros name?” or “What was the number 1 song the day you were born?”

Read More

VPN Logs. Should you be concerned?

VPN logs

I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service?

Read More

Data breach video series – CCTV Leakage

Data Breach CCTV Leakage

Data Breach CCTV Leakage. This short video talks about how allowing CCTV footage to be leaked online is a serious data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Open Plan Office

Data Breach Open Plan Office

Data Breach Open Plan Office. This short video talks about how having a public space near to an open plan office may lead to a data breach under the #GDPR. A breach may arise where your staff are speaking to other staff or to people on the phone and they are speaking items of personal…

Read More