NUI Galway Data Breach – Lessons learned?

nui galway data breach

The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren’t very clear.

Read More

How to deal with Ransomware.

Deal with Ransomware

I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either…

Read More

Posh POS was Compromised

POS was compromised

A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &…

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is…

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not…

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect…

Read More

Sneaky Tax Refund e-mails

Tax refund scam

Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently,…

Read More

Simple Security Planner tool for EVERYONE!

Security Planner

I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your…

Read More

Dodgy e-mail that looks legit.

Dodgy e-mail

I received a dodgy e-mail on my personal account yesterday. I’m surprised the GMail spam filters didn’t catch it and flag it for me. Like last weeks story, this message…

Read More

Double check your security.

Double Check Security

There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).

Read More

Heathrow’s dangerous data breach

heathrow data breach

You may not have heard about this, as it emerged on Sunday. There was a data breach relating to Heathrow Airport. A fully accessible USB memory stick was found on…

Read More

Malicious e-mail from Yahoo! breach.

malicious e-mail

I’ve received the first malicious e-mail as a result of a compromised Yahoo! e-mail account. I’ve warned the individual and hopefully he still has control of the account and can…

Read More

Yahoo breach – Round 3 … Billion! ?

yahoo breach

If you had a Yahoo!, BT or Sky e-mail account (also AT&T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.

Read More

Cloud Security is your responsibility.

cloud security

I see a read a lot of cyber security stories and nothing surprises me any more. I constantly see stories about breaches and phishing. Now I turn my jaundiced eye…

Read More

Pacemaker updates – they’re a thing now!?!?

Pacemaker updates

On August 23rd the Food and Drug Administration (FDA) in the US approved the deployment of a software update for pacemakers made by St. Jude Medical.  This was to fix…

Read More