<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 23 Feb 2026 17:04:47 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security for Charities</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-charities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 20:49:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Charities]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Charities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Charities]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2772</guid>

					<description><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. <span id="more-2772"></span>By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips to help your cyber security for charities and enable you to bolster your cyber security posture.<img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2774" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg" alt="Cyber Security for Charities" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<p>&nbsp;</p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your staff and volunteers to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff and Volunteers:</h3>
<p>Start by ensuring that all staff and volunteers are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your charity vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your charity&#8217;s data is crucial. Choose a secure, reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive charity data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for charities</h3>
<p>Cyber security is of paramount importance for charities, as it protects sensitive data and preserves the trust of supporters. By following these essential cyber security tips, charities can significantly strengthen their defences against cyber threats. Maintain a proactive approach to cyber security for charities, regularly review and update your security measures, and stay vigilant to evolving risks. With robust cyber security measures in place, your charity can continue making a positive impact while safeguarding its digital assets.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business, so we can focus on delivering appropriate and <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">relevant services</a> to this sector. Also, we offer a 10% discount on all of our standard rates to registered charities.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security for Small Business</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-small-business/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:20:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Small Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Small Business]]></category>
		<category><![CDATA[Small Business]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2764</guid>

					<description><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. <span id="more-2764"></span>Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your cyber security for small business and stay safe in the online realm.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2768" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg" alt="Cyber Security for Small Business" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your employees to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff:</h3>
<p>Start by ensuring that all employees are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your business vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your business data is crucial. Choose a reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive business data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for small business</h3>
<p>Protecting your small business from cyber threats should be a top priority. By following these simple cyber security tips, you can significantly enhance your defences and minimise the risk of breaches and data loss. Remember, a proactive approach to cyber security for small business is the key to keeping your business safe in the digital world. Stay vigilant and regularly review your security measures to adapt to evolving threats.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business too, so we do offer <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">various services</a> which are suited to this sector.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT Task Calendar for Small and Medium Businesses</title>
		<link>https://www.l2cybersecurity.com/it-task-calendar-for-small-and-medium-businesses/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 10:10:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Cybersecurity Calendar]]></category>
		<category><![CDATA[Infosec Calendar]]></category>
		<category><![CDATA[IT Calendar]]></category>
		<category><![CDATA[IT Task Calendar]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2721</guid>

					<description><![CDATA[<p>If you are a small or medium business owner without an internal IT person or department, you should set up a schedule for performing some simple IT tasks.  An IT Task Calendar if you will. This will make sure your IT is working well and everything is being kept up-to-date. Why do I need an&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/it-task-calendar-for-small-and-medium-businesses/">IT Task Calendar for Small and Medium Businesses</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you are a small or medium business owner without an internal IT person or department, you should set up a schedule for performing some simple IT tasks.  An <span style="text-decoration: underline;"><strong>IT Task Calendar</strong></span> if you will. This will make sure your IT is working well and everything is being kept up-to-date.<span id="more-2721"></span></p>
<h2>Why do I need an IT Task Calendar?</h2>
<p>If you were a larger enterprise, with an IT person/department or an IT Managed Service Provider (IT MSP), part of their responsibility should be carrying out regular maintenance tasks that would keep your IT working well and everything kept up-to-date.</p>
<p>I was inspired to write this post from a <a href="https://isc.sans.edu/diary/What+is+in+your+Infosec+Calendar/29118/" target="_blank" rel="noopener">SANS Internet Storm Centre Diary</a> that was published last year.</p>
<p>I have my own such calendar embedded in my head and I tend to do these things automatically without thinking. This is likely because it is the habit of nearly 40 years of fiddling with and subsequently working on computers. On my laptop, I close all applications and shut the laptop down every night. This simple act absolves me of having to do the daily and one of the weekly tasks below.</p>
<h2>Too Long; Didn&#8217;t Read (TL;DR)</h2>
<h3>Daily:</h3>
<ul>
<li>Restart your browser.</li>
</ul>
<h3>Weekly:</h3>
<ul>
<li>Restart your Laptop/Desktop, Smartphone and Tablet (apply updates if available)</li>
<li>Run an Anti Virus scan (schedule if possible)</li>
</ul>
<h3>Monthly:</h3>
<ul>
<li>Apply Microsoft updates</li>
<li>Apply updates to other software applications</li>
<li>Check your backups</li>
</ul>
<h3>Quarterly:</h3>
<ul>
<li>Printer, Router, Firewall, Switch, IoT device update check</li>
<li>Do a failover check (if applicable)</li>
</ul>
<p><img decoding="async" class="aligncenter size-full wp-image-2762" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/IT-Task-Calendar.gif" alt="IT Task Calendar TLDR animation" width="540" height="540" /></p>
<hr />
<h2><strong>Daily tasks:</strong></h2>
<h3>Restart your browser at least once a day</h3>
<p>The first item for our IT Task Calendar.</p>
<p>A lot of us spend quite a lot of our time in our internet browser. They are incredible applications that give us such a rich experience using the internet. They are also extremely complicated and prone to there being vulnerabilities present due to such complexity. Because of their ubiquitous nature, they are very much what the criminals like to target. So it is imperative that the vulnerabilities are removed.</p>
<p>The browser makers have gotten very proactive about keeping their browser up-to-date, in a very inconspicuous way. It happens in the background while the browser is open. However, for the updates to properly take effect, the browser needs to be restarted. If you do this once a day, you will be well protected.</p>
<p>If you are the type of person that has multiple browser tabs open all of the time, this might cause you to be reluctant to do so however. There are solutions for you though.</p>
<h4>Use the normal update mechanism:</h4>
<p>In your browser:</p>
<ol>
<li>go to the &#8220;Help-&gt;About Chrome/Firefox/Edge&#8221;</li>
<li>this will trigger the update mechanism to get all updates installed</li>
<li>when you see the button to &#8220;Restart&#8221; the browser, click on it</li>
<li>the browser will close and re-open, including all of the tabs that were previously open on it</li>
</ol>
<h4>Make sure the browser remembers where you were previously:</h4>
<p>A word of warning here &#8230; this option has been known to fail occasionally and people have lost track of their many, many open tabs. If you don&#8217;t want to risk that, do the above instead.</p>
<p>Go into your browser settings and:</p>
<p><strong>Chrome:</strong></p>
<ul>
<li>On the menu on the left, click &#8220;On start-up&#8221;</li>
<li>Click &#8220;Continue where you left off&#8221;</li>
</ul>
<p><strong>Firefox:</strong></p>
<ul>
<li>At the top, under <strong>Startup</strong> should be the option &#8220;Open previous windows and tabs&#8221; &#8211; check that to turn it on</li>
</ul>
<p><strong>Edge:</strong></p>
<ul>
<li>On the menu on the left, click &#8220;Start, home and new tabs&#8221;</li>
<li>Click &#8220;Open tabs from the previous session&#8221;</li>
</ul>
<h4>Use a browser extension to remember your open tabs:</h4>
<p>I&#8217;m certain there are browser extensions that can help you to manage and remember your open tabs. I won&#8217;t recommend any particular one, as I have no experience of them and I am not keen on the over reliance on browser extensions, other than the two or three I use for ad/cookie blocking and tracking prevention.</p>
<hr />
<h2><strong>Weekly tasks:</strong></h2>
<h3>Restart your Laptop/Desktop, Smartphone and Tablet once a week</h3>
<p>For the same reason that we restart our browser, our devices also need to be restarted to apply any updates that may have been downloaded for the operating system. In <em>Windows</em> this might show as &#8220;Update and Restart&#8221; or &#8220;Update and Shut down&#8221;. Be sure to click on the appropriate one if they appear.</p>
<p>But it&#8217;s not just about updates in this case. If you keep <em>Windows</em> active and only put it to <em>Sleep</em> by closing the lid every evening, then after a few weeks it may exhibit unusual behaviour. Things like the mouse cursor might jump around the place or applications freeze or crash for no reason. This is because <em>Windows</em> is going a bit crazy (in simple terms).</p>
<p>You know the old IT trope?</p>
<blockquote><p><strong>&#8220;Have you tried switching it off and back on again?&#8221;</strong></p></blockquote>
<p>There&#8217;s a very good reason that this is usually the first thing we ask.</p>
<p>It&#8217;s because it fixes most problems that people have.</p>
<p>So just restart your device once a week, please. Include your Smartphones and Tablets on this.</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on a Thursday or Friday.</strong></span></p>
<h3>Run an Anti Virus scan</h3>
<p>Your anti-virus application should be able to do this on a schedule, so you can set this up to run automatically.</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Schedule this in your Anti Virus application to occur at a time you wont be using your device for maybe up to an hour, perhaps over a lunch break.</strong></span></p>
<hr />
<h2><strong>Monthly tasks:</strong></h2>
<h3>Microsoft Patch Tuesday</h3>
<p>On the second Tuesday of every month, Microsoft release updates to their products. It has become known as Patch Tuesday. We usually get them on a Wednesday in Ireland. The restart your device weekly item above, should take care of this task for you if you do it on a Thursday or Friday.</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on the second Thursday or Friday.</strong></span></p>
<h3>Check for other software updates</h3>
<p>A lot of other applications are good at checking for updates when they start up. Try to apply them when they ask for it and don&#8217;t just click &#8220;Defer&#8221; or &#8220;Later&#8221;, unless you are genuinely stuck for time.</p>
<p>If you do defer the updates, make sure that you have a list of applications that you use frequently. Once a month go through that list, checking their update status and applying any updates that are available.</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on the third Tuesday.</strong></span></p>
<h3>Backup Checks</h3>
<p><span style="color: #000000;">I have a convoluted backup strategy for my laptop, which utilises cloud storage for my critical data, local network storage and external hard drives for my backups of that data and less important items.</span></p>
<p>If you don&#8217;t have a backup strategy, start with the 3-2-1 methodology:</p>
<ul>
<li><span style="text-decoration: underline;"><strong>Three</strong></span> copies of your data &#8211; one of which is your live data.</li>
<li><span style="text-decoration: underline;"><strong>Two</strong></span> backup copies held on separate media (cloud, local storage, external hard drives, magnetic tape, etc.)</li>
<li><span style="text-decoration: underline;"><strong>One</strong></span> copy offline and another offsite.</li>
</ul>
<p><span style="color: #000000;">The thing about backups is, that they are badly needed, usually at a time of crisis. That is not the time to find out that an external hard drive that you are now depending on for recovering data, was dropped on the ground 6 months ago and hasn&#8217;t been properly backing up your data since.</span></p>
<p>So for each type of backup you take, restore a small, random selection of files from the backup media, to check that you can access them and that they are not corrupted in anyway.</p>
<p>If you want to be very thorough, you should do a complete recovery test once a year.</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on the Friday before the second Tuesday.</strong></span></p>
<hr />
<h2><strong>Quarterly tasks &#8211; IT support may be needed:</strong></h2>
<h3>Printer, Router, Firewall, Switch, IoT device update check</h3>
<p>Virtually all hardware we use runs a type of software that is usually called firmware. Many hardware and other network devices have no robust way to notify you of updates to its firmware. Often, you need to manually check the current firmware version and compare it to the latest firmware available from the manufacturer. Care needs to be taken when updating firmware as a simple disconnection at the wrong time could cause the hardware device to fail completely (also known as being &#8220;bricked&#8221; &#8211; i.e. turning the device into something with all the functionality of a brick).</p>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on the fourth Tuesday of the second month in the quarter.</strong></span></p>
<h3>Failover checks</h3>
<p>This will depend on your set-up &#8211; particularly if you have any kind of high-availability requirement for things like internet or power. Carry out these checks at a time that will cause the least disruption to your business if something were to go wrong.</p>
<h4>Connectivity:</h4>
<ul>
<li>If you have a secondary internet connection available at all times, then fail your primary connection by disconnecting the router&#8217;s WAN port. See if all of your main applications continue to work appropriately and that your staff are able to continue doing their work. Reconnect the router&#8217;s WAN port again to restore normal operations.</li>
<li>After completing the previous test, wait for 15-20 minutes. Now fail the secondary connection by disconnecting its router&#8217;s WAN port. This will prove that there is no weird configuration whereby a failure of your backup connection can cause you problems.</li>
<li>If you don&#8217;t have a secondary internet connection, but plan to rely on a hotspot from a mobile phone, then fail your primary connection by disconnecting the router&#8217;s WAN port. Then set up the hotspot/tether on your mobile phone and see what connectivity you are able to achieve on that from your various devices.</li>
<li>Do the above as well if you plan to relocate to another location in the event of power and internet disconnection at your main office.</li>
</ul>
<h4>Power:</h4>
<ul>
<li>If you have generator backup for power, then you should follow the guidance provided by your registered electrician for carrying out power failure testing on the generator.</li>
<li>If you are depending on an Uninterruptible Power Supply (UPS), then test it by removing power to it&#8217;s mains connection (e.g.- turning off the switch on the wall socket or tripping it&#8217;s circuit breaker on your fuse board). Do not unplug the UPS.</li>
</ul>
<p><span style="color: #339966;"><strong><span style="color: #ff0000;">♣</span> Add this to your IT Task Calendar on the third Friday of the first month in the quarter.</strong></span></p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">Business Resiliency</a> service which would help you to create a proper plan for all of the above.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/it-task-calendar-for-small-and-medium-businesses/">IT Task Calendar for Small and Medium Businesses</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Browser Password Manager is not as secure as you think</title>
		<link>https://www.l2cybersecurity.com/browser-password-manager-not-secure/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 18 Apr 2023 08:00:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Browser Password Manager]]></category>
		<category><![CDATA[Browser Password Manager insecure]]></category>
		<category><![CDATA[Browser Password Manager not secure]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2702</guid>

					<description><![CDATA[<p>Whenever I talk about password managers I often get asked by people about their browser password manager and whether that is a secure method of storing passwords. They&#8217;re not really the best solution. Here&#8217;s why. They store passwords. Surely they must be secure? The password managers that are built into Chrome, Edge and Firefox are&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/browser-password-manager-not-secure/">Browser Password Manager is not as secure as you think</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Whenever I talk about password managers I often get asked by people about their browser password manager and whether that is a secure method of storing passwords. They&#8217;re not really the best solution. Here&#8217;s why.</p>
<p><span id="more-2702"></span></p>
<h3>They store passwords. Surely they must be secure?</h3>
<p>The password managers that are built into Chrome, Edge and Firefox are very simplistic and while they do stores things encrypted, the encryption can be easily broken.</p>
<p><a href="https://nypost.com/2022/01/02/experts-warn-against-storing-passwords-in-chrome/" target="_blank" rel="noopener">A person&#8217;s Google Chrome password manager was breached not so long ago</a>.</p>
<p>The thing is, these password managers are very easy to use and browsers are great at pushing them on people. Putting up nice friendly notices going &#8220;Do you want me to remember this password?&#8221; &#8220;Do you want me to remember this credit card number?&#8221; Then later on when you come back to sign into the site it will pop the username and password into the page for you. It&#8217;s all very convenient. But convenience comes at the cost of security in this case.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2713" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/chrome-password-manager.jpg" alt="The Chrome password manager offering to save a password for the user." width="460" height="600" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/chrome-password-manager.jpg 460w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/chrome-password-manager-230x300.jpg 230w" sizes="auto, (max-width: 460px) 100vw, 460px" /></p>
<h3>How is a browser password manager insecure?</h3>
<p>If you think about it, these password managers have no real security in place. So if somebody has access to the browser, when the device is unlocked, they also now have access to your password vault.</p>
<p>If you were using a proper password manager they would need to know your master password and also have access to your multi-factor authentication (MFA) method. That&#8217;s because password managers have proper security on their password vaults.</p>
<h3>What do you recommend?</h3>
<p>The world will be a much better place when <a href="https://fidoalliance.org/passkeys/" target="_blank" rel="noopener">passkeys are more widely used</a>.</p>
<p>Until then, I always recommend using a full-featured password manager such as <a href="https://bitwarden.com/" target="_blank" rel="noopener">Bitwarden</a> or <a href="https://1password.com/" target="_blank" rel="noopener">1Password</a>. These are designed to be fully secure and keep your passwords, payment card information and secure notes all nice and securely saved. There are other password managers available. Some of these might be classified as being more secure or private than the two I have mentioned. However there are some trade-offs with them in that they may need someone more technical to set them up and use them. This might be off-putting to normal people as it can be inconvenient.</p>
<h3>I&#8217;ve got a password manager in another application. How good are they?</h3>
<p>Some people come to me and say that their anti-virus package or their VPN has a password manager as an add-on feature. I am cautious about using such features because they may not have been developed with the same level of security as a proper password manager. They are likely only being offered as a way to lock somebody into continuing to subscribe to the anti-virus or VPN.</p>
<p>This is because it is easy to switch anti-virus or VPN providers. But when you are are using a password manager it is much more difficult to move and switch provider.</p>
<h3>OK! OK! We&#8217;ll use a proper password manager. Any tips?</h3>
<p>Some quick tips for setting up your password manager as securely as possible:</p>
<ol>
<li>Choose a master password that is at least 20 characters long. Perhaps choose three or four completely random words to make up this master password. Maybe include some spaces between the words and an occasional number and special character.</li>
<li>You should also secure the password manager with a multi-factor authentication method. Ideally it should be an authentication app that generates codes or a hardware security key that you need to trigger the authentication.</li>
<li>Set the password manager to generate passwords of at least 40 characters, with all the cases, numbers and special characters turned on so that the passwords are nicely complicated. Watch out though for some websites that have limited the number of characters you can use &#8230; some as low as 10 or 12 characters, which is ridiculous.</li>
</ol>
<h3>Anything else I need to think about with a proper password manager?</h3>
<p>Some security people think that using the browser add-on or plugin for the proper password manager is NOT very good security practice. Yes, there are risks associated with the add-on/plugin, but I think their convenience for the normal person makes password manager use more likely. But it all really depends on your threat model. If you think you&#8217;re low risk then using the add-on/plugin is probably also low risk.</p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/browser-password-manager-not-secure/">Browser Password Manager is not as secure as you think</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Legal Basis for Processing</title>
		<link>https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:44:07 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Legal Basis]]></category>
		<category><![CDATA[Legal Basis for Processing]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2739</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) outlines the conditions under which there is a legal basis for processing personal data. Download Detailed Guidance Here The Six Lawful Bases for Processing: To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (Article&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2739 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2739"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-z7y2e5gamipf" data-node="z7y2e5gamipf">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> outlines the conditions under which there is a legal basis for processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-owx9h013v2js" data-node="owx9h013v2js">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-smkepv8xnwgr" data-node="smkepv8xnwgr">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h2><a name="_Toc222253324"></a>The Six Lawful Bases for Processing:</h2>
<p>To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1">Article 6</a>). If you cannot fit your processing into one of these boxes, you cannot collect the data.</p>
<p>You must identify and document one of these bases before you start processing data.</p>
<ul>
<li><strong>Consent:</strong> The individual has given you clear, specific permission to process their data for a specific purpose.</li>
<li><strong>Contract:</strong> You need to process the data to fulfil a contract with the individual (e.g., you need their address to deliver goods they bought).</li>
<li><strong>Legal Obligation:</strong> You are required by law to process the data (e.g., keeping salary records for tax purposes).</li>
<li><strong>Vital Interests:</strong> It is a life-or-death situation (e.g., giving emergency medical data to a hospital to save someone's life).</li>
<li><strong>Legitimate Interests:</strong> You have a genuine business reason (like fraud prevention or network security), and this reason is not overridden by the individual's rights or freedoms.</li>
<li><strong>Public Interest:</strong> You are performing a task in the public interest or acting under official authority (usually applies to government bodies, not private companies).</li>
</ul>
<p>&nbsp;</p>
<h2><a name="_Toc222253325"></a>1. Strict Rules for "Consent"</h2>
<p>If you choose "Consent" as your legal basis, the bar is set very high. You must be able to prove you obtained it validly.</p>
<ul>
<li><strong>Freely Given:</strong> The user must have a real choice. You cannot force them to consent or punish them if they say no.</li>
<li><strong>Informed:</strong> They must know exactly who you are and what you are doing with their data.</li>
<li><strong>Specific:</strong> You cannot ask for "blanket consent." You must ask for permission for each specific purpose.</li>
<li><strong>Clear Affirmative Action:</strong> The user must do something to consent (like ticking a box). You must also keep a record of this consent being given. Pre-ticked boxes are banned.</li>
<li><strong>Easy Withdrawal:</strong> You must tell them they can withdraw consent at any time, and if they do, you must stop processing immediately.</li>
</ul>
<p>&nbsp;</p>
<h2>2. <a name="_Toc222253328"></a>Contractual Necessity</h2>
<p><strong>When to use it:</strong> Use this when you have a contract with an individual (or are about to enter one) and you literally cannot do your job without their data.</p>
<p><strong>The Rule:</strong> The processing must be necessary for the performance of a contract to which the individual is a party.</p>
<p><strong>Practical Example:</strong> If you sell a product online, you need the customer's address to deliver it. You don't need their consent for the address. You need it to fulfil the contract of sale.</p>
<p><strong>Constraint:</strong> You cannot use this for things that are "nice to have" but not essential to the contract (e.g., using that same address for marketing newsletters usually requires a different basis, like Consent).</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253329"></a>3. Legal Obligation</h2>
<p><strong>When to use it:</strong> Use this when you have no choice because the law says you must process the data.</p>
<p><strong>The Rule:</strong> The processing is necessary for compliance with a legal obligation.</p>
<p><strong>Practical Example:</strong> You are required by tax laws to keep records of employee salaries for a certain number of years. Even if an employee asks you to delete their data, you can refuse because you have a legal obligation to keep it.</p>
<p><strong>Constraint:</strong> This must be a statutory obligation (EU or National law), not just a contractual obligation to a third party or your own company policy.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253330"></a>4. Vital Interests</h2>
<p><strong>When to use it:</strong> This is the "Emergency Only" basis. It applies to life-or-death situations.</p>
<p><strong>The Rule:</strong> The processing is necessary to protect the vital interests of the data subject or another person.</p>
<p><strong>Practical Example:</strong> If a visitor to your office collapses and is unconscious, you might disclose their medical allergies (if known) to the paramedics. You don't need to wake them up to get consent because their life (vital interest) is at risk.</p>
<p><strong>Constraint:</strong> You generally cannot use this for large-scale data processing or health data unless it is truly a medical emergency.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253331"></a>5. Legitimate Interests</h2>
<p><strong>When to use it:</strong> This is the most flexible basis, often used for business activities like fraud prevention, network security, or direct marketing. However, it requires a careful "Balancing Test".</p>
<p><strong>The Rule:</strong> Processing is necessary for your legitimate interests (or those of a third party), UNLESS those interests are overridden by the individual's fundamental rights and freedoms.</p>
<p><strong>The "Balancing Test":</strong> You must weigh your benefit against the user's privacy:</p>
<p><strong>Your side:</strong> "We need to process IP addresses to stop hackers attacking our website." (This is a strong legitimate interest).</p>
<p><strong>Their side:</strong> "Does this hurt the user's privacy?" (Likely minimal impact).</p>
<p><strong>Result:</strong> You can probably proceed.</p>
<p><strong>Constraint:</strong> If the processing would be unexpected, cause harm, or if the individual is a child, their rights likely override your interests. You must document this assessment.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253332"></a>6. Public Interest / Official Authority</h2>
<p><strong>When to use it:</strong> This is primarily for public authorities (like schools, hospitals, police, or councils) performing their official duties.</p>
<p><strong>The Rule:</strong> The processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in you.</p>
<p><strong>Practical Example:</strong> A local council collecting data to organise bin collection or a tax authority collecting income data.</p>
<p><strong>Constraint:</strong> Private companies rarely use this unless they are contracted to carry out specific public tasks (e.g., a private utility company maintaining the water supply).</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-k83hnq942ex6" data-node="k83hnq942ex6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Principles of the GDPR</title>
		<link>https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:37:37 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Principles]]></category>
		<category><![CDATA[Principles of the GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2735</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) sets out the principles of the GDPR that organisations must follow when processing personal data. Download Detailed Guidance Here Principles of the GDPR Here is a simplified guide to the 7 Core Principles of the GDPR (Article 5). Think of these not just as codes, but as the "Golden&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2735 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2735"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-6uevfy4tsmk3" data-node="6uevfy4tsmk3">
			<div class="fl-col fl-node-tywc61d08b2m fl-col-bg-color" data-node="tywc61d08b2m">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-wlgck6yehmd9" data-node="wlgck6yehmd9">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> sets out the principles of the GDPR that organisations must follow when processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-f32r8zk7jtn6" data-node="f32r8zk7jtn6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-pc8s63b9lxrh" data-node="pc8s63b9lxrh">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1><strong>Principles of the GDPR</strong></h1>
<p>Here is a simplified guide to the 7 Core Principles of the GDPR (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1">Article 5</a>).</p>
<p>Think of these not just as codes, but as the "Golden Rules" for how you handle data. If you violate these principles, you are violating the GDPR, even if your security is technically perfect.</p>
<p>&nbsp;</p>
<h2>Lawfulness, Fairness, and Transparency</h2>
<p><strong>Your Obligation:</strong> You must be honest and open about what you are doing.</p>
<p><strong>Lawful:</strong> You cannot process data just because you want to. You need a valid legal reason (like Consent or a Contract).</p>
<p><strong>Fair:</strong> You shouldn't do things with data that people wouldn't expect or that could mislead them. You must give them control over their information.</p>
<p><strong>Transparent:</strong> You can't hide in the shadows. You must provide clear, accessible information (usually a Privacy Notice) explaining exactly how you process their data.</p>
<p>&nbsp;</p>
<h2>Purpose Limitation</h2>
<p><strong>Your Obligation:</strong> Be specific about why you need the data and stick to that reason.</p>
<p><strong>The Rule:</strong> You must collect data for "specified, explicit, and legitimate purposes".</p>
<p><strong>No "Scope Creep":</strong> You cannot collect data for one reason (e.g., "to deliver a pizza") and then use it for a completely different reason later (e.g., "to sell their address to a gym"), unless you get fresh consent or have another clear legal reason.</p>
<p><strong>Communication:</strong> You must tell the individual this purpose at the start.</p>
<p>&nbsp;</p>
<h2>Data Minimisation</h2>
<p><strong>Your Obligation:</strong> Collect only what you strictly need.</p>
<p><strong>The Rule:</strong> Data must be adequate, relevant, and limited to what is necessary for your specific purpose.</p>
<p><strong>Practical Step:</strong> If you don't need someone's date of birth to sell them a book, don't ask for it. Avoid hoarding "just in case" data.</p>
<p>&nbsp;</p>
<h2>Accuracy</h2>
<p><strong>Your Obligation:</strong> Keep the data correct and up to date.</p>
<p><strong>The Rule:</strong> You must take reasonable steps to ensure data is not incorrect or misleading.</p>
<p><strong>Correction:</strong> If you find out data is wrong, you must fix it or erase it without delay. You should also give individuals an easy way to update their own records.</p>
<p>&nbsp;</p>
<h2>Storage Limitation</h2>
<p><strong>Your Obligation:</strong> Don't keep data forever.</p>
<p><strong>The Rule:</strong> You must not keep personal data for longer than you actually need it for your stated purpose.</p>
<p><strong>Guidance:</strong> There may be a statutory requirement for a retention period (e.g. Revenue), or a supervisory body providing guidance. If neither exist, then set your own retention period and document the justification for it.</p>
<p><strong>Retention Policy:</strong> You need a clear policy that says when you will delete data. When that time comes, you must securely erase or anonymise it.</p>
<p>&nbsp;</p>
<h2>Integrity and Confidentiality (Security)</h2>
<p><strong>Your Obligation:</strong> Keep the data safe.</p>
<p><strong>The Rule:</strong> You must protect data against unauthorised access, accidental loss, destruction, or damage.</p>
<p><strong>Measures:</strong> This isn't just about firewalls. It includes organisational measures like taking data backups, restricting access so only the staff who need to see the data can see it, amongst other things.</p>
<p>&nbsp;</p>
<h2><em><strong>Accountability</strong></em></h2>
<p><strong>Your Obligation:</strong> Prove it.</p>
<p><strong>The Rule:</strong> It is not enough to just comply with these principles. You must be able to demonstrate that you comply.</p>
<p><strong>Documentation:</strong> This requires you to have written policies, records of your processing activities, and internal procedures in place to show regulators that you take these rules seriously.</p>
<h2><strong style="color: #ff0000; font-size: 16px;"><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></h2>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-6skdhpegzwc0" data-node="6skdhpegzwc0">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rights of an Individual</title>
		<link>https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 13:46:30 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Individual's Rights]]></category>
		<category><![CDATA[Rights of an individual]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2732</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) provides strong rights of an individual, whose personal data is being processed by organisations. Download Detailed Guidance Here The Rights of an Individual The right to be informed Article 13 and Article 14. Your Obligation: You must be completely transparent about how you use personal data. You cannot collect&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2732 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2732"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-pyocfb5ue2r4" data-node="pyocfb5ue2r4">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2161-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> provides strong rights of an individual, whose personal data is being processed by organisations.</p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-noqujwizr2fs" data-node="noqujwizr2fs">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-2rfcs1d89elm" data-node="2rfcs1d89elm">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1>The Rights of an Individual</h1>
<h2><a name="_Toc484164476"></a><a name="_Toc132378641"></a>The right to be informed</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2254-1-1">Article 13</a> and <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2355-1-1">Article 14</a>.</p>
<p><strong>Your Obligation:</strong> You must be completely transparent about how you use personal data. You cannot collect data in secret; you must provide "fair processing information," typically through a Privacy Notice.</p>
<p><strong>What to include:</strong> You must detail your identity and contact info (and that of your DPO), why you are processing the data and the legal basis for doing so, how long you will keep it, and who else will receive it. You must also list the users' rights, including their right to withdraw consent or lodge a complaint.</p>
<p><strong>Format:</strong> The information must be concise, transparent, intelligible, easily accessible, and free of charge. It must be written in clear, plain language—especially if addressed to a child.</p>
<p><strong>Timing:</strong></p>
<ul>
<li><strong>Direct Collection:</strong> If you got the data straight from the individual, give them this info at the time you collect it.</li>
<li><strong>Indirect Collection:</strong> If you got the data from elsewhere, you must inform the individual within a reasonable period (maximum one month), or at the point you first communicate with them or share the data with someone else.</li>
</ul>
<p>The table below summarises the information you should supply to individuals where the personal data has been obtained either directly from the data subject or by another means.</p>
<table>
<tbody>
<tr>
<td width="301">Identity and contact details of the controller (and where applicable, the controller’s representative) and the data protection officer.</td>
<td width="301">The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</td>
</tr>
<tr>
<td width="301">Any recipient or categories of recipients of the personal data.</td>
<td width="301">Purpose of the processing and the legal basis for the processing.</td>
</tr>
<tr>
<td width="301">The right to lodge a complaint with a supervisory authority.</td>
<td width="301">The existence of each of data subject’s rights.</td>
</tr>
<tr>
<td width="301">Retention period or criteria used to determine the retention period.</td>
<td width="301">Details of transfers to a different country and what safeguards apply.</td>
</tr>
<tr>
<td width="301">The right to withdraw consent at any time, where relevant.</td>
<td width="301">The legitimate interests of the controller or third party, where applicable.</p>
<p>&nbsp;</td>
</tr>
</tbody>
</table>
<p>If the personal data was obtained directly from the data subject, then you should provide them with the above information at the time you get the personal data.</p>
<p>The next table summarises the information you should supply to individuals where the personal data has not been obtained directly from the data subject.</p>
<table>
<tbody>
<tr>
<td width="301">The source the personal data originates from and whether it came from publicly accessible sources.</td>
<td width="301">Categories of personal data.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><a name="_Toc484164478"></a><a name="_Toc132378642"></a>The right of access (Subject Access Requests)</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2513-1-1">Article 15</a>.</p>
<p><strong> </strong><strong>Your Obligation:</strong> You must allow individuals to verify that their data is being processed lawfully. If asked, you must confirm you are processing their data and provide a copy of it.</p>
<p><strong> </strong><strong>Deadlines:</strong> You must respond without delay, and at the latest within one month.</p>
<p><strong> </strong><strong>Extension:</strong> You can extend this by two months if the request is complex or numerous, but you must notify the individual within the first month and explain why.</p>
<p><strong> </strong><strong>Fees:</strong> You generally cannot charge a fee.</p>
<p style="padding-left: 40px;"><strong><em>Exception:</em></strong> You may charge a "reasonable fee" based on administrative costs only if the request is "manifestly unfounded or excessive" (e.g., repetitive) or for additional copies.</p>
<p><strong> </strong><strong>Verification:</strong> You must verify the identity of the requester using reasonable means before handing over data.</p>
<p style="padding-left: 40px;"><strong>Suggested ways:</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Ask the individual to confirm details only they would know based on the data you already hold. Ask 2-3 specific questions:
<ul>
<li>"Please confirm the amount of your last transaction with us."</li>
<li>"What is the reference number on your most recent bill?"</li>
<li>"Please confirm the phone number we have on file for you."</li>
</ul>
</li>
<li>Require the user to log in to their secure account area to submit the request.</li>
<li>If you must ask for photo ID, ask them to redact unnecessary information – e.g. “Please send a photo of your driving licence, but please black out your licence number and date of birth. We only need to see your name and photo”</li>
</ul>
</li>
</ul>
<p><strong> </strong><strong>Format:</strong> If the request is made electronically, you should provide the data in a commonly used electronic format.</p>
<p><a name="_Toc484164485"></a><strong> </strong></p>
<h2><a name="_Toc132378643"></a>The right to rectification</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2599-1-1">Article 16</a>.</p>
<p><a name="_Toc484164487"></a><a name="_Toc132378644"></a><strong> </strong><strong>Your Obligation:</strong> You must correct inaccurate or incomplete personal data upon request.</p>
<p><strong>Third Parties:</strong> If you have shared this data with other organisations, you must inform them of the correction if possible.</p>
<p><strong>Deadlines:</strong> You have one month to comply. This can be extended by two months for complex requests, provided you notify the individual.</p>
<p><strong>Refusal:</strong> If you decide not to take action, you must explain why and inform the individual of their right to complain to a supervisory authority.</p>
<p>&nbsp;</p>
<h2>The right to erasure ("Right to be Forgotten")</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2606-1-1">Article 17</a>.</p>
<p><a name="_Toc484164492"></a><strong> </strong><strong>Your Obligation:</strong> You must delete personal data when there is no compelling reason to keep it. <strong><u>BUT</u></strong> this is not an absolute right. You are quite likely to refuse this one, as its scope is quite narrow.</p>
<p><strong>When to delete:</strong> You must act if:</p>
<ol>
<li>consent is withdrawn</li>
<li>the data is no longer needed for its original purpose</li>
<li>it was processed unlawfully</li>
<li>if there is a legal obligation to delete it</li>
</ol>
<p>Special attention is required for data collected from children online.</p>
<p><strong>Public Data:</strong> If you have made the data public (e.g., on a website), you must take reasonable steps to inform other controllers processing that data to erase links to or copies of it.</p>
<p><strong>Exceptions:</strong> You can refuse deletion if the processing is necessary for freedom of expression, public health, contractual, legal obligations, or the defence of legal claims.</p>
<p>&nbsp;</p>
<h2><a name="_Toc132378645"></a>The right to restrict processing</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2700-1-1">Article 18</a>.</p>
<p><a name="_Toc484164494"></a> <strong>Your Obligation:</strong> In specific circumstances, you must stop using the data but keep it stored. You can retain just enough info to ensure the restriction is respected in the future.</p>
<p><strong>When to restrict:</strong> You must apply this if an individual contests the accuracy of data (while you verify it), if they object to processing (while you verify your legitimate grounds), or if the processing is unlawful but the individual prefers restriction over deletion.</p>
<p><strong>Notification:</strong> You must inform any third parties you shared the data with about the restriction. You must also tell the individual before you lift the restriction.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378646"></a>The right to data portability</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2753-1-1">Article 20</a>.</p>
<p><a name="_Toc484164498"></a> <strong>Your Obligation:</strong> You must allow individuals to obtain and reuse their data across different services by providing it in a format that allows easy transfer.</p>
<p><strong>Format:</strong> Provide the data in a structured, commonly used, and machine-readable form (e.g., CSV files) so software can extract the data.</p>
<p><strong>Scope:</strong> This applies only to data the individual provided to you, processed by automated means, based on consent or a contract.</p>
<p><strong>Direct Transfer:</strong> If the individual asks and it is technically feasible, you should transfer the data directly to another organisation.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378647"></a>The right to object</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2803-1-1">Article 21</a>.</p>
<p><a name="_Toc484164503"></a> <strong>Your Obligation:</strong> You must respect an individual's right to say "no" to processing in certain cases.</p>
<p><strong>Direct Marketing:</strong> If an individual objects to direct marketing, you must stop immediately. There are no exemptions or grounds to refuse.</p>
<p><strong>Legitimate Interests/Public Task:</strong> If they object to processing based on these grounds, you must stop unless you can demonstrate "compelling legitimate grounds" that override their rights, or if it is for legal claims.</p>
<p><strong>Communication:</strong> You must explicitly bring this right to their attention at the point of first communication and in your privacy notice, keeping it separate from other information.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378648"></a>Rights in relation to automated decision making and profiling</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2838-1-1">Article 22</a>.</p>
<p><strong>Your Obligation:</strong> You must provide safeguards against potentially damaging decisions made solely by computers without human intervention.</p>
<p><strong>The Right:</strong> Individuals can refuse to be subject to automated decisions that have legal or significant effects on them.</p>
<p><strong>Safeguards:</strong> If you use automated decision-making, you must allow the individual to obtain human intervention, express their point of view, and obtain an explanation of the decision so they can challenge it.</p>
<p><strong>Profiling:</strong> If you use profiling (analysing personal aspects like performance, health, or location), you must be transparent about the logic involved and the significance of the consequences. You must use appropriate mathematical procedures and secure the data to prevent errors or discrimination.</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-p687qt9i0vao" data-node="p687qt9i0vao">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An Post Scam Email Gaeilge Edition</title>
		<link>https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 11:11:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[An post]]></category>
		<category><![CDATA[An post scam email]]></category>
		<category><![CDATA[Email scam]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2704</guid>

					<description><![CDATA[<p>I know many people I talk to mention they have received An Post scam messages. These have increased dramatically in the last couple of years. Thank you Brexit! Over the weekend I received a new twist on it. An An Post scam email that was as Gaeilge (in Irish). The email itself ended up in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/">An Post Scam Email Gaeilge Edition</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I know many people I talk to mention they have received <a href="https://www.anpost.com/" target="_blank" rel="noopener"><em>An Post</em></a> scam messages. These have increased dramatically in the last couple of years. Thank you Brexit! Over the weekend I received a new twist on it. An <em>An Post</em> scam email that was as Gaeilge (in Irish).</p>
<p><span id="more-2704"></span></p>
<p>The email itself ended up in my spam/junk folder. However, not everybody uses the same email platform that I do. Chances are, because it is in Irish, it might bypass such protective systems.</p>
<h3>What did the <em>An post</em> scam email look like?</h3>
<p>Here is the email that I received:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2706" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1.jpg" alt="A scam email from An Post (the Irish postal service) that is written in Irish." width="684" height="663" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1.jpg 684w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1-300x291.jpg 300w" sizes="auto, (max-width: 684px) 100vw, 684px" /></p>
<p>For those of you who haven&#8217;t got the cúpla focail, it translates as:</p>
<blockquote><p><strong>An error occurred in the delivery process</strong></p>
<p>Dear customer,<br />
You have a package that needs to be delivered, but it has been put on hold due to an incorrect delivery address.<br />
Edit your personal information and add a valid shipping address to complete the delivery process.</p>
<p>• Tracking number: DA053884562IE<br />
• Re-delivery fee: €1.99.<br />
• Date: 25/03/2023</p>
<p><span style="text-decoration: underline;"><strong><span style="color: #339966; text-decoration: underline;">Redelivery</span></strong></span></p>
<p><em>This is an automated message, please do not reply.</em></p>
<p>Attention : If you do not update your details and enter a valid shipping address within 3 days of receiving this message, we will return this package.<br />
The job.</p></blockquote>
<p>I had to laugh at the last line there &#8211; An post translates to &#8220;The job&#8221;. 🤣</p>
<h3>What happens if I made a mistake and clicked the button?</h3>
<p>You would be brought to a website, that looks remarkably like an <em>An Post</em> website. In keeping with the theme of the email, it will all be in Irish. On this page you would be asked to enter lots of personal data, including payment card information. I&#8217;ve translated the various input fields in <span style="color: #ff0000;"><strong>red</strong></span> in the image below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-2707" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-535x1024.jpg" alt="An post scam website, which is in Irish, looking for personal data and payment card information." width="535" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-535x1024.jpg 535w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-157x300.jpg 157w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-768x1469.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-803x1536.jpg 803w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2.jpg 806w" sizes="auto, (max-width: 535px) 100vw, 535px" /></p>
<p>One interesting thing here is that the links at the bottom of the page are all genuine <em>An post</em> website links and will take you to the genuine site and social media channels.</p>
<h3>I can&#8217;t read Irish. Sure how would I know what I&#8217;m being asked for?</h3>
<p>You mightn&#8217;t be able to translate that website. Your browser probably can and so it can be easy to potentially fall victim, particularly where you are waiting for a package to be delivered.</p>
<h3>Is there anything that gives this away as a scam?</h3>
<p>If this was for a genuine shipment, with some missing address data, they should show you what address information they do have and allow you to correct it. So that is the main giveaway to me.</p>
<p>People like me (a security nerd) will examine the address bar of a website. I know some trainers tell people they need to examine this themselves. However, that&#8217;s terrible advice, as most normal people will never do that on a consistent basis. Not only that, how can I be completely sure that this address is not correct? &#8220;anpost&#8221; is mentioned a couple of times, as well as the .com portion. Website addresses are hard sometimes:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2708" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21.jpg" alt="The address bar of the An post scam website. The main give away is that it says &quot;Not secure&quot;." width="736" height="66" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21-300x27.jpg 300w" sizes="auto, (max-width: 736px) 100vw, 736px" /></p>
<p>Another big giveaway here is the &#8220;Not secure&#8221; warning. If you EVER come across that on a website, DO NOT enter any data on that website, no matter whether you think it&#8217;s a genuine site or not. Anything you type will not be transmitted in a secure manner.</p>
<p>HOWEVER, the scammers could easily set the website up so that the &#8220;Not secure&#8221; is not shown, so don&#8217;t be completely dependent on that as a way to avoid being scammed.</p>
<h3>Well what would you do so mister smarty pants?</h3>
<p>If I had something on order, I would refer back to the original shipping email and click the tracking link from that.</p>
<p>If that wasn&#8217;t available, then I would copy the tracking number from the <em>An post</em> scam email, go to the <a href="https://www.anpost.com/" target="_blank" rel="noopener"><em>An post</em> website</a> and paste it into the tracking facility. It should spit out a message saying that the package can&#8217;t be found.</p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/">An Post Scam Email Gaeilge Edition</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESB text message scam.</title>
		<link>https://www.l2cybersecurity.com/esb-text-message-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Mar 2023 13:31:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[ESB Text Message Scam]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[SMS Scam]]></category>
		<category><![CDATA[Text Message Scam]]></category>
		<category><![CDATA[Text Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2680</guid>

					<description><![CDATA[<p>My good friend Philipa Jane Farley shared a text message with me, which she received this morning. Her phone had classed it as Spam, but not all smartphones are created equal, so this ESB text message scam might get through. The ESB text message The message appears to have come from &#8220;ESB&#8221; and it cannot&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/esb-text-message-scam/">ESB text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My good friend <a href="https://www.linkedin.com/in/philipafarley/" target="_blank" rel="noopener">Philipa Jane Farley</a> shared a text message with me, which she received this morning. Her phone had classed it as Spam, but not all smartphones are created equal, so this ESB text message scam might get through.<span id="more-2680"></span></p>
<h2>The ESB text message</h2>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-2682 alignleft" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-229x300.jpeg" alt="" width="229" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-229x300.jpeg 229w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-781x1024.jpeg 781w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-768x1007.jpeg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0.jpeg 1042w" sizes="auto, (max-width: 229px) 100vw, 229px" />The message appears to have come from &#8220;ESB&#8221; and it cannot be replied to, which gives it a certain degree of legitimacy. If you have taken my training you will know that you simply cannot trust what number is calling you or texting you, as <a href="https://en.wikipedia.org/wiki/SMS_spoofing" target="_blank" rel="noopener">spoofing</a> is so common.</p>
<p>The message says:</p>
<blockquote><p>You are eligible for a discounted electricity bill under the Energy support scheme.</p>
<p>You can apply here: https[:]//register-electric-refund[.]com</p></blockquote>
<p>I have &#8220;defanged&#8221; that link so you cannot go to the site accidentally.</p>
<p>If you go ahead and click the link, you will be taken to the following web site:</p>
<h2>The &#8220;Government&#8221; information page</h2>
<p><img loading="lazy" decoding="async" class="size-large wp-image-2683 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-735x1024.jpg" alt="" width="735" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-735x1024.jpg 735w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-215x300.jpg 215w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-768x1071.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1.jpg 1094w" sizes="auto, (max-width: 735px) 100vw, 735px" /></p>
<p>That looks remarkably like the <strong>ACTUAL</strong> Irish Government Website which is here:</p>
<p><a href="https://www.gov.ie/en/publication/4ae14-electricity-costs-emergency-benefit-scheme/" target="_blank" rel="noopener">https://www.gov.ie/en/publication/4ae14-electricity-costs-emergency-benefit-scheme/</a></p>
<p>That is, all except for the &#8220;Verify now&#8221; button at the bottom. The criminals have effectively cloned the majority of the government&#8217;s page on this scheme. None of the links work on the page that I tested &#8230; EXCEPT for that &#8220;Verify Now&#8221; button. 🤔</p>
<h2>The &#8220;Registration&#8221; pages</h2>
<p>Well, if you click that, the &#8220;government&#8221; now seems to want you to register for the scheme (which is automatically dealt with by the power supply companies), so you are first asked for some personal details:<img loading="lazy" decoding="async" class="size-full wp-image-2684 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4.jpg" alt="" width="647" height="787" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4-247x300.jpg 247w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>When you hit &#8220;Continue, you will then be asked to provide some billing details.</p>
<p>Billing details?!??!!? I thought they were giving us money, not billing us?</p>
<p>Well, they are probably hoping that you are used to divulging your payment card details onto website.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2685 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6.jpg" alt="" width="644" height="701" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6.jpg 644w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6-276x300.jpg 276w" sizes="auto, (max-width: 644px) 100vw, 644px" /></p>
<p>They do validation on the card number and the page crashed on me as I was attempting to enter a potentially valid number, so I wasn&#8217;t able to find out what happened next, but presumably they will start buying stuff on your account!</p>
<p>So there it is &#8230; an ESB text message scam, that could just as easily be for any of the other providers, but it&#8217;s likely only going to be the ESB as they have the most customers in the country.</p>
<p>Let&#8217;s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/esb-text-message-scam/">ESB text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>eFlow text message scam.</title>
		<link>https://www.l2cybersecurity.com/eflow-text-message-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Jan 2023 14:54:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[eFlow Text Message Scam]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[SMS Scam]]></category>
		<category><![CDATA[Text Message Scam]]></category>
		<category><![CDATA[Text Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2695</guid>

					<description><![CDATA[<p>My good friend Philipa Jane Farley shared a text message with me, which she received this morning. This eFlow text message scam might get through to your phone, so read on for more information. The eFlow Text Message The text message she received from &#8220;eFlow&#8221; was about an unpaid toll. eFlow is an Irish motorway toll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eflow-text-message-scam/">eFlow text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My good friend <a href="https://www.linkedin.com/in/philipafarley/" target="_blank" rel="noopener">Philipa Jane Farley</a> shared a text message with me, which she received this morning. This eFlow text message scam might get through to your phone, so read on for more information.<span id="more-2695"></span></p>
<h3>The eFlow Text Message</h3>
<p>The text message she received from &#8220;eFlow&#8221; was about an unpaid toll. <a href="https://www.eflow.ie/" target="_blank" rel="noopener">eFlow</a> is an Irish motorway toll operator. (narrator&#8217;s voice: It was not from eFlow 🙄).</p>
<p>The message reads:</p>
<blockquote><p>eFlow: You have an outstanding fee of 6.32 EUR due from a journey made in 2022. Please pay now to avoid incurring any penalty charges via <span style="text-decoration: underline;">eflow-online-services[.]com</span></p></blockquote>
<p>That link has been defanged, so you cannot click on it accidentally.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2696 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1.jpg" alt="Scam eFlow text message with malicious link" width="774" height="448" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1.jpg 774w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1-300x174.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1-768x445.jpg 768w" sizes="auto, (max-width: 774px) 100vw, 774px" /><br />
If you click on the link, you will get taken to a very realistic and similar looking website, to the real eFlow one. This though, seems to have nothing to do with the unpaid toll. 🤔</p>
<h3><img loading="lazy" decoding="async" class="size-large wp-image-2697 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-646x1024.jpg" alt="eFlow scam website looking for you to change details." width="646" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-646x1024.jpg 646w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-189x300.jpg 189w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-768x1217.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-969x1536.jpg 969w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2.jpg 1292w" sizes="auto, (max-width: 646px) 100vw, 646px" />What do they want you to do?</h3>
<p>They want you to update your details with them, including payment card. This is the type of thing that you can look out for. A site asking you for lots of personal data when you&#8217;ve clicked a link. eFlow already has your data, if you are a customer. They do not need you to go and type it all in again. No matter what excuse they make up. If this was really eFlow, they would have provided the details they already held on you!</p>
<p><img loading="lazy" decoding="async" class="size-large wp-image-2698 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-647x1024.jpg" alt="eFlow scam website asking you to enter lots of personal details on the site." width="647" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-647x1024.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-189x300.jpg 189w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-768x1216.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-970x1536.jpg 970w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3.jpg 1293w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<h3>What should I do?</h3>
<p>I hope I say this enough. We really need to stop clicking on any link that might be included in text messages. There is just no decent reason to have links sent by text message. The criminals use them, because they tend to get passed a lot of spam filters. If this was sent by email or WhatsApp it would probably get thrown into the junk folder.</p>
<p>I think most of you that have seen previous posts from me, won&#8217;t fall victim to such a scam, but please do share this, so others will be aware of it.</p>
<p>If anybody has gone through with this update, please contact your bank&#8217;s fraud number immediately.</p>
<p>So there it is. An eFlow text message scam. Please don&#8217;t fall for it.</p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/eflow-text-message-scam/">eFlow text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
