Posts Tagged ‘Commandments’
NUI Galway Data Breach – Lessons learned?
The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren’t very clear.
Read MoreHow to deal with Ransomware.
I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either…
Read MorePosh POS was Compromised
A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &…
Read MoreIs somebody else using your password?
Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is…
Read MoreWebsites compromised to generate money
“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not…
Read MoreVulnerable Cisco Firewalls
It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect…
Read MoreSneaky Tax Refund e-mails
Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently,…
Read MoreSimple Security Planner tool for EVERYONE!
I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your…
Read MoreDodgy e-mail that looks legit.
I received a dodgy e-mail on my personal account yesterday. I’m surprised the GMail spam filters didn’t catch it and flag it for me. Like last weeks story, this message…
Read MoreDouble check your security.
There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).
Read MoreHeathrow’s dangerous data breach
You may not have heard about this, as it emerged on Sunday. There was a data breach relating to Heathrow Airport. A fully accessible USB memory stick was found on…
Read MoreMalicious e-mail from Yahoo! breach.
I’ve received the first malicious e-mail as a result of a compromised Yahoo! e-mail account. I’ve warned the individual and hopefully he still has control of the account and can…
Read MoreYahoo breach – Round 3 … Billion! ?
If you had a Yahoo!, BT or Sky e-mail account (also AT&T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.
Read MoreCloud Security is your responsibility.
I see a read a lot of cyber security stories and nothing surprises me any more. I constantly see stories about breaches and phishing. Now I turn my jaundiced eye…
Read MorePacemaker updates – they’re a thing now!?!?
On August 23rd the Food and Drug Administration (FDA) in the US approved the deployment of a software update for pacemakers made by St. Jude Medical. This was to fix…
Read More