<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Clare Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/clare/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/clare/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:13:41 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Clare Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/clare/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 100 Something Completely Different</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 07:15:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[And now for something completely different]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Something Completely Different]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2632</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 100. And now for something completely different. How is this something completely different? For this auspicious edition of #WeekendWisdom, I thought I would introduce you to the team behind the series. This is Scamp, who is a little camera shy. He is my eldest boy. And this is Paddy, who is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/">#WeekendWisdom 100 Something Completely Different</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 100. And now for something completely different.<span id="more-2632"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2632-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4</a></video></div>
<h3>How is this something completely different?</h3>
<p>For this auspicious edition of #WeekendWisdom, I thought I would introduce you to the team behind the series.</p>
<p>This is Scamp, who is a little camera shy. He is my eldest boy.</p>
<p>And this is Paddy, who is my smallest boy. But he has got the biggest personality of them both.</p>
<h3>So what is going on?</h3>
<p>We&#8217;ve been having meetings on our daily walks, discussing how we could possibly improve the content that we provide to you, our audience. We have some ideas which I think you might find interesting and I hope you enjoy them, but we just need a few weeks to get ourselves together. Set out a decent plan for what we are going to do and we will be back sometime in November. It might be called something different, so this will actually be the last #WeekendWisdom, I&#8217;m afraid.</p>
<p>But it will be something similar. It will be a weekly video post with some hopefully interesting content that you will enjoy.</p>
<h3>TTFN</h3>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again &#8230;&#8230;&#8230;&#8230;.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/">#WeekendWisdom 100 Something Completely Different</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4" length="25309529" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 099 Using the security.txt file</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Oct 2021 07:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Reporting a Data Breach]]></category>
		<category><![CDATA[Reporting Data Breaches]]></category>
		<category><![CDATA[Security Researchers]]></category>
		<category><![CDATA[security.txt]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Using the security.txt file]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2627</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file. Why is this a thing If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.<span id="more-2627"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2627-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4</a></video></div>
<h3>Why is this a thing</h3>
<p>If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data on some underground forums, where they might try and sell it to other criminal gangs, for their use.</p>
<p>But there are also, usually, good guy security researchers in those forums too, keeping an eye on things. If they come across some company’s data being trying to be sold, they may try to notify the company that there has been a breach as they may not be aware of it. Sometimes the security researchers find it difficult to get through to these companies to make contact with somebody that they can discuss this data breach.</p>
<h3>How can using the security.txt file help</h3>
<p>That’s where the security.txt file comes in. This is just a simple text file that contains some contact information for somebody in the security area or in IT. Somebody that would be reachable by email and maybe if you want to do it securely they may also include the public encryption key for the email to make sure that all communications are kept secured so that the security researchers can reach out and contact the company. They can use the contact address and get in touch there to report the data breach and maybe other vulnerabilities that they may have discovered.</p>
<h3>Where can I find out more</h3>
<p>So it&#8217;s always good to have this and it&#8217;s usually placed on your website in a well-known location. Here is the <a href="https://securitytxt.org/" target="_blank" rel="noopener">security.txt proposed standard</a>.</p>
<p>So if you have a website, set-up this security.txt file for it.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4" length="35355646" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 098 Lessons from the Facebook Outage</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 08 Oct 2021 07:15:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#FacebookDown]]></category>
		<category><![CDATA[#InstagramDown]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[#WhatsAppDown]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Facebook Outage]]></category>
		<category><![CDATA[Lessons from the Facebook Outage]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2623</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 98. This week we&#8217;re going to talk about Lessons from the Facebook Outage. No. There is no Facebook bashing here. Just the fax mam. 😎 Where were you on the late afternoon, early evening when Facebook and Instagram and WhatsApp were all down for nearly 6 hours? What had happened to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/">#WeekendWisdom 098 Lessons from the Facebook Outage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 98. This week we&#8217;re going to talk about Lessons from the Facebook Outage.<span id="more-2623"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2623-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4</a></video></div>
<h3>No. There is no Facebook bashing here. Just the fax mam. 😎</h3>
<p>Where were you on the late afternoon, early evening when Facebook and Instagram and WhatsApp were all down for nearly 6 hours?</p>
<p>What had happened to them was that they were making a routine change to their network configuration. But there was a bug somewhere in it, that caused them to basically disconnect completely from the internet. So nobody on the internet could see Facebook, Instagram, WhatsApp or any of their services. But not only that, this bug also cut off their internal access to their systems. So they could not even see their own email or messaging systems internally and this also prevented the engineers who had made the change from being able to get access to the equipment that they put the change onto and to try and reverse it.</p>
<h3>Lessons from the Facebook Outage</h3>
<p>So what can we learn about this? Well, I suppose the thing is, the way Facebook are set-up, they seem to have everything is in one big giant bubble that they all use internally. So all their eggs are in one basket. But if you were in an environment where a change like that could take out your entire environment, you might want to consider having some other alternatives that are not based on your internal network.</p>
<h3>What could you use</h3>
<p>So instead of using WhatsApp you might consider using something like Signal for messaging or even come back to good old fashioned text messages. Have some other kind of, what they call, out-of-band way of being able to communicate internally and be able to get around any kind of outage like this that might occur.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/">#WeekendWisdom 098 Lessons from the Facebook Outage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4" length="34684577" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 097 Record Number of Zero Days</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 05:15:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[0 Days]]></category>
		<category><![CDATA[0Days]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[ODays]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Record Number of 0 Days]]></category>
		<category><![CDATA[Record Number of Zero Days]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero Days]]></category>
		<category><![CDATA[ZeroDays]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2618</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 97. This week we&#8217;re going to talk about record number of zero days. More on Zero Days? In last week&#8217;s #WeekendWisdom number 96, I explained what a zero day was. The reason I brought up this topic in the first place was because, as at that date, 2021 had already become&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/">#WeekendWisdom 097 Record Number of Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 97. This week we&#8217;re going to talk about record number of zero days.<span id="more-2618"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2618-4" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4</a></video></div>
<h3>More on Zero Days?</h3>
<p>In last week&#8217;s <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/" target="_blank" rel="noopener">#WeekendWisdom number 96</a>, I explained what a zero day was. The reason I brought up this topic in the first place was because, as at that date, 2021 had already become a year where there was a record number of zero days being detected.</p>
<h3>How is it a record number of zero days?</h3>
<p>The number that was reported then was like 66 zero days:</p>
<ul>
<li>20 were associated with Microsoft products</li>
<li>15 zero days were associated with Apple products, which people think Apple is the most secure platform &#8230; maybe not</li>
<li>Google had 11 zero days</li>
</ul>
<p>So previous years there might have been 40 or 50 zero days detected in the whole year. But here we are still in September and we&#8217;ve already blown through those records.</p>
<p>Even in just the last week since I recorded the last #WeekendWisdom, there have been four more zero days detected. Three of them associated with Apple products and one with Google Chrome.</p>
<p>So this really is turning out to be a year of the zero days. They really are happening a lot.</p>
<h3>How do you protect yourself</h3>
<p>So please folks be sure that you put in place good robust patching process to make sure you keep all your software up to date as early as possible. Also do things like keep your backups, do good backups, test the backups to make sure that you can recover from those backups and also make sure you train your staff. But keep your software patched.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/">#WeekendWisdom 097 Record Number of Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4" length="33914833" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 096 Zero Days</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Sep 2021 07:15:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[0 Days]]></category>
		<category><![CDATA[0Days]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[ODays]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Days]]></category>
		<category><![CDATA[ZeroDays]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2612</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days. Where is this coming from? Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical. You see when security researchers are analysing various software like&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days.<span id="more-2612"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2612-5" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical.</p>
<p>You see when security researchers are analysing various software like Microsoft, Apple and Google products, if they discovery a vulnerability in that software, they will report it to the vendor and give them an opportunity to rectify it and fix it before they make it public. They usually give them a period of months, normally it is usually 3 months.</p>
<h3>What are Zero Days?</h3>
<p>But in the case of zero days what happens is that a vulnerability is exposed on a day when nobody is aware of it until everybody is suddenly aware of it, including the vendor and including criminal gangs.</p>
<p>These cyber criminal gangs will immediately start looking to try and exploit that zero day vulnerability, while the vendors are rushing to try and fix it, to put out an update to fix that vulnerability.</p>
<p>That can take time. It can take days, it could take weeks to fix it. So it&#8217;s kind of a race against time for the cyber criminals to try and crack it and exploit it and for the vendors to fix it and update it.</p>
<h3>What should you do?</h3>
<p>So if you ever hear me talking about &#8220;There’s a zero day vulnerability out there that you need to patch!&#8221;, you should be looking to try and patch that as quickly as possible.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4" length="31106775" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 095 Why Updates are Important</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 07:15:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Why Updates are important]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2607</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important. This sounds familiar Waaaay back in the early days of the #WeekendWisdom series, back at number 3, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important.<span id="more-2607"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2607-6" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4?_=6" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Waaaay back in the early days of the #WeekendWisdom series, back at <a href="https://www.l2cybersecurity.com/weekendwisdom-003-updates/" target="_blank" rel="noopener">number 3</a>, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video.</p>
<p>The events of the last week has brought it back to me that this really is an important topic that we all need to be aware of.</p>
<h3>What happened this last week?</h3>
<p>Apple, earlier this week, released updates to its iPhones and Mac computers and watches that plugged a vulnerability which was being exploited by a surveillance software maker which literally all they had to do if they wanted to take control of somebody&#8217;s iPhone we&#8217;ll say, all they need to do is send a message to that phone and just when the phone receives the message, they now have control of it. The user of the phone did not have to do anything. So that&#8217;s pretty scary.</p>
<p>Also there was the vulnerability that I talked about in <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/" target="_blank" rel="noopener">last week&#8217;s #WeekendWisdom</a>. Microsoft have issued updates for that this week. So again, it&#8217;s really critical that if you have updates waiting on your Windows computer to apply them.</p>
<h3>This is the reason why updates are important</h3>
<p>You see the problem here is that when the likes of Apple or Microsoft issue updates, criminals go and take those updates, they look at them and they find out what exactly has been fixed in Windows or in the iPhones or whatever. Then they can figure out how they can exploit that, that vulnerability that was there that was fixed. If people don&#8217;t do the updates, the criminals can now exploit them, for those people who don&#8217;t, because there are quite a lot of people who don&#8217;t apply updates.</p>
<p>But it&#8217;s really important that you do.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4" length="34691857" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 094 How to remove Internet Explorer</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 07:15:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[How to remove IE]]></category>
		<category><![CDATA[How to remove Internet Explorer]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[IE Retirement]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Internet Explorer Retirement]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2602</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer. Why would you want to do this? Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer.<span id="more-2602"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2602-7" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4?_=7" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4</a></video></div>
<h3>Why would you want to do this?</h3>
<p>Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see there is a vulnerability in it that can be exploited by somebody sending you a malicious word document. That all you have to do is open the document. You don&#8217;t need to take any other action, like click enable content or any other thing. Opening the document will exploit this vulnerability and cause malicious code to be run on your computer.</p>
<h3>Check if you should first</h3>
<p>Now before you take any of these steps, please check with your IT support that you really don&#8217;t need to use Internet Explorer anymore or that you&#8217;re allowed to remove it. So please check first.</p>
<h3>How to remove Internet Explorer</h3>
<p>This is how you get rid of it.</p>
<ol>
<li>Go down to the bottom left hand corner and click the start button and select settings.</li>
<li>Click Apps.</li>
<li>Then click Optional features.</li>
<li>Find Internet Explorer, click on it and click uninstall.</li>
<li>Then when you see this thing and it&#8217;s finished, reboot your computer.</li>
</ol>
<p>Once it comes back up again, you should be safe.</p>
<h3>What if you need Internet Explorer?</h3>
<p>If you really do need to use Internet Explorer for some legacy application or something like that, there is an Internet Explorer mode in the Microsoft Edge browser. Google that and find out how you can use that mode.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4" length="32134340" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 093 Botnets</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-093-botnets/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 07:15:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Devices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attack]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2597</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets. You&#8217;ve mentioned these before Back in #WeekendWisdom number 76, where I talked about connecting devices to the internet and #WeekendWisdom number 84, where I talked about distributed denial-of-service attacks, I mentioned botnets. What are botnets? A botnet is a collection of a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets.<span id="more-2597"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2597-8" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4?_=8" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4</a></video></div>
<h3>You&#8217;ve mentioned these before</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom number 76</a>, where I talked about connecting devices to the internet and <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/" target="_blank" rel="noopener">#WeekendWisdom number 84</a>, where I talked about distributed denial-of-service attacks, I mentioned botnets.</p>
<h3>What are botnets?</h3>
<p>A botnet is a collection of a large amount of compromised devices that are connected to the internet.</p>
<h3>How do they get formed?</h3>
<p>There are legitimate services out there that scan the entire internet and every device that is connected to it and it keeps a database of all these devices.</p>
<p>Criminals then using these legitimate services are able to tailor their searches and locate:</p>
<ul>
<li>CCTV cameras</li>
<li>Baby monitors</li>
<li>Digital video recorders</li>
<li>In-house IP cameras</li>
<li>Any other type of device that may be connected to the internet in a very insecure manner</li>
</ul>
<p>If they can detect these through this database, what they can do then is compromises it using maybe:</p>
<ul>
<li>Default credentials</li>
<li>Known compromise</li>
<li>Weak vulnerabilities</li>
</ul>
<p>in those devices. Take them over, add them to their botnet and then they have control of these devices. They give them instructions to carry out a distributed denial of service attack.</p>
<p>So that&#8217;s how these botnets get formed.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4" length="30869996" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 092 Encryption</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-092-encryption/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Aug 2021 07:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Ciphertext]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Decrypt]]></category>
		<category><![CDATA[Encrypt]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Plaintext]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2592</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 92. This week we&#8217;re going to talk about Encryption. Where did this story start? A few weeks ago, I was talking to some people about my favourite topic #Ransomware and I was explaining how ransomware goes through the process of encryption of all the data files that they can see. Somebody&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-092-encryption/">#WeekendWisdom 092 Encryption</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 92. This week we&#8217;re going to talk about Encryption.<span id="more-2592"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2592-9" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4?_=9" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4</a></video></div>
<h3>Where did this story start?</h3>
<p>A few weeks ago, I was talking to some people about my favourite topic #Ransomware and I was explaining how ransomware goes through the process of encryption of all the data files that they can see. Somebody stopped me and asked me, what do I mean by encryption?</p>
<p>I was kinda surprised that the word wasn&#8217;t really better known out there, maybe its because of the industry I&#8217;m in.</p>
<h3>What is Encryption?</h3>
<p>Encryption at it&#8217;s most basic form is the scrambling of a set of data in conjunction with some kind of a key that will scramble the data make it unusable, you won&#8217;t understand what it is, unless you have the key which, whoever receives the data, they have the key, they can decrypt the data. Get it back to something that looks normal.</p>
<h3>How does it work?</h3>
<p>So what we talk about in the information security business:</p>
<ol>
<li>you take <span style="text-decoration: underline;"><strong>plaintext</strong></span>, which is the stuff that you can read.</li>
<li>you apply the key to it, which generates <span style="text-decoration: underline;"><strong>ciphertext</strong></span>, which is what&#8217;s transmitted.</li>
<li>Anybody that gets the <span style="text-decoration: underline;"><strong>ciphertext</strong></span>, they won&#8217;t be able to understand it.</li>
<li>When it gets to the other side, the person uses the key and it decrypts the data and they get back to <span style="text-decoration: underline;"><strong>plaintext</strong></span>.</li>
</ol>
<h3>All very modern sounding.</h3>
<p>This has been around for since ancient times. There was apparently some encryption found in some tomb in Egypt from like 1900 BC. So Encryption has been around a long time. It&#8217;s not just something new with computers.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-092-encryption/">#WeekendWisdom 092 Encryption</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4" length="31787103" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 091 Phishing for Credentials</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 07:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Phishing]]></category>
		<category><![CDATA[Credentials]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Google Account Login]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Google Drive Link]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Microsoft Account Login]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing for Credentials]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[SharePoint Link]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2588</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials. This sounds familiar I covered something pretty similar back in #WeekendWisdom number 42 where I covered Consent Phishing. But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials.<span id="more-2588"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2588-10" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4?_=10" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>I covered something pretty similar back in <a href="https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/" target="_blank" rel="noopener">#WeekendWisdom number 42</a> where I covered Consent Phishing.</p>
<p>But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your email address and your password. They can later on compromise your email account or perhaps log into your office systems to be able to execute a ransomware attack.</p>
<h3>How do they carry out phishing for credentials?</h3>
<p>The methods they use are varied, but a very sneaky one that they typically use is, they will send an email with an actual SharePoint link in there, or this could be a Google Drive link as well. People are very familiar with SharePoint links and Google drive links. They are usually fairly safe to click because these are things that people deal with on a day-to-day basis. They&#8217;re not some crazy dodgy site that you are being linked to. It&#8217;s something you&#8217;re familiar with.</p>
<p>Then when you click on the link, then it will say &#8220;Oh. You need to sign into your Microsoft account&#8221; or &#8220;&#8230; your Google account to be able to get into this document.&#8221; That&#8217;s where they catch you. They pop-up a login page and you give up your user ID and password in there. Now they have it.</p>
<h3>How can you protect yourself from this?</h3>
<p>So it&#8217;s really important that you implement something like multi-factor authentication to get an additional set of protections from these sorts of attacks.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4" length="31363196" type="video/mp4" />

			</item>
	</channel>
</rss>
