Posts Tagged ‘Best Practice’

Eir laptop theft – could have been worse

The eir laptop theft that was revealed this week was pretty … actually … it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse!

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. 😏

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.

Read More

Simple Security Planner tool for EVERYONE!

Security Planner

I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.

Read More

Password Sharing = Data Breach

password sharing

I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought “That’s not a good idea. This person needs to receive some security awareness training.” I even have a commandment for it.

Read More

Double check your security.

Double Check Security

There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).

Read More

What Ophelia taught me about power.

Power cables

Hurricane Ophelia came to Ireland this week and caused quite a lot of damage across the country. Trees were blown down. Roofs were ripped off. The electrical power supply grid was widely disrupted. The area where my office is, had no power for over 48 hours.

Read More

Communication is vital after a disaster.

Communication is vital after a disaster

Maersk Line were one of the biggest victims of the Petya/NotPetya Ransomware worm that struck on 27th June 2017. Here are some details, in case you missed it. Two weeks later, they are still not back to full operational capacity, but they are doing something really well. The are using the critical competence of communication…

Read More

Permission to spy on you?

Permission to spy on you

Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that…

Read More

Do you WannaCry? I didn’t think so.

Do you WannaCry?

I delayed this week’s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I’ll start with some easy background on Ransomware and them explain what was special…

Read More

Take a 2-Minute Privacy check-up.

2 Minute Privacy Check-up

After last week’s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.

Read More

Here is a worrying aspect of the Yahoo breach.

Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There’s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account. Yahoo provides e-mail services to some big internet service providers (ISPs), over in…

Read More