<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/cyber-security/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:11:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Cyber Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/cyber-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security for Charities</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-charities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 20:49:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Charities]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Charities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Charities]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2772</guid>

					<description><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. <span id="more-2772"></span>By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips to help your cyber security for charities and enable you to bolster your cyber security posture.<img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2774" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg" alt="Cyber Security for Charities" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<p>&nbsp;</p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your staff and volunteers to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff and Volunteers:</h3>
<p>Start by ensuring that all staff and volunteers are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your charity vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your charity&#8217;s data is crucial. Choose a secure, reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive charity data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for charities</h3>
<p>Cyber security is of paramount importance for charities, as it protects sensitive data and preserves the trust of supporters. By following these essential cyber security tips, charities can significantly strengthen their defences against cyber threats. Maintain a proactive approach to cyber security for charities, regularly review and update your security measures, and stay vigilant to evolving risks. With robust cyber security measures in place, your charity can continue making a positive impact while safeguarding its digital assets.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business, so we can focus on delivering appropriate and <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">relevant services</a> to this sector. Also, we offer a 10% discount on all of our standard rates to registered charities.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security for Small Business</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-small-business/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:20:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Small Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Small Business]]></category>
		<category><![CDATA[Small Business]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2764</guid>

					<description><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. <span id="more-2764"></span>Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your cyber security for small business and stay safe in the online realm.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2768" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg" alt="Cyber Security for Small Business" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your employees to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff:</h3>
<p>Start by ensuring that all employees are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your business vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your business data is crucial. Choose a reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive business data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for small business</h3>
<p>Protecting your small business from cyber threats should be a top priority. By following these simple cyber security tips, you can significantly enhance your defences and minimise the risk of breaches and data loss. Remember, a proactive approach to cyber security for small business is the key to keeping your business safe in the digital world. Stay vigilant and regularly review your security measures to adapt to evolving threats.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business too, so we do offer <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">various services</a> which are suited to this sector.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#WeekendWisdom 100 Something Completely Different</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 07:15:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[And now for something completely different]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Something Completely Different]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2632</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 100. And now for something completely different. How is this something completely different? For this auspicious edition of #WeekendWisdom, I thought I would introduce you to the team behind the series. This is Scamp, who is a little camera shy. He is my eldest boy. And this is Paddy, who is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/">#WeekendWisdom 100 Something Completely Different</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 100. And now for something completely different.<span id="more-2632"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2632-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4</a></video></div>
<h3>How is this something completely different?</h3>
<p>For this auspicious edition of #WeekendWisdom, I thought I would introduce you to the team behind the series.</p>
<p>This is Scamp, who is a little camera shy. He is my eldest boy.</p>
<p>And this is Paddy, who is my smallest boy. But he has got the biggest personality of them both.</p>
<h3>So what is going on?</h3>
<p>We&#8217;ve been having meetings on our daily walks, discussing how we could possibly improve the content that we provide to you, our audience. We have some ideas which I think you might find interesting and I hope you enjoy them, but we just need a few weeks to get ourselves together. Set out a decent plan for what we are going to do and we will be back sometime in November. It might be called something different, so this will actually be the last #WeekendWisdom, I&#8217;m afraid.</p>
<p>But it will be something similar. It will be a weekly video post with some hopefully interesting content that you will enjoy.</p>
<h3>TTFN</h3>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again &#8230;&#8230;&#8230;&#8230;.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-100-something-completely-different/">#WeekendWisdom 100 Something Completely Different</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-100-lo.mp4" length="25309529" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 099 Using the security.txt file</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Oct 2021 07:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Reporting a Data Breach]]></category>
		<category><![CDATA[Reporting Data Breaches]]></category>
		<category><![CDATA[Security Researchers]]></category>
		<category><![CDATA[security.txt]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Using the security.txt file]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2627</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file. Why is this a thing If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.<span id="more-2627"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2627-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4</a></video></div>
<h3>Why is this a thing</h3>
<p>If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data on some underground forums, where they might try and sell it to other criminal gangs, for their use.</p>
<p>But there are also, usually, good guy security researchers in those forums too, keeping an eye on things. If they come across some company’s data being trying to be sold, they may try to notify the company that there has been a breach as they may not be aware of it. Sometimes the security researchers find it difficult to get through to these companies to make contact with somebody that they can discuss this data breach.</p>
<h3>How can using the security.txt file help</h3>
<p>That’s where the security.txt file comes in. This is just a simple text file that contains some contact information for somebody in the security area or in IT. Somebody that would be reachable by email and maybe if you want to do it securely they may also include the public encryption key for the email to make sure that all communications are kept secured so that the security researchers can reach out and contact the company. They can use the contact address and get in touch there to report the data breach and maybe other vulnerabilities that they may have discovered.</p>
<h3>Where can I find out more</h3>
<p>So it&#8217;s always good to have this and it&#8217;s usually placed on your website in a well-known location. Here is the <a href="https://securitytxt.org/" target="_blank" rel="noopener">security.txt proposed standard</a>.</p>
<p>So if you have a website, set-up this security.txt file for it.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4" length="35355646" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 098 Lessons from the Facebook Outage</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 08 Oct 2021 07:15:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#FacebookDown]]></category>
		<category><![CDATA[#InstagramDown]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[#WhatsAppDown]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Facebook Outage]]></category>
		<category><![CDATA[Lessons from the Facebook Outage]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2623</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 98. This week we&#8217;re going to talk about Lessons from the Facebook Outage. No. There is no Facebook bashing here. Just the fax mam. 😎 Where were you on the late afternoon, early evening when Facebook and Instagram and WhatsApp were all down for nearly 6 hours? What had happened to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/">#WeekendWisdom 098 Lessons from the Facebook Outage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 98. This week we&#8217;re going to talk about Lessons from the Facebook Outage.<span id="more-2623"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2623-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4</a></video></div>
<h3>No. There is no Facebook bashing here. Just the fax mam. 😎</h3>
<p>Where were you on the late afternoon, early evening when Facebook and Instagram and WhatsApp were all down for nearly 6 hours?</p>
<p>What had happened to them was that they were making a routine change to their network configuration. But there was a bug somewhere in it, that caused them to basically disconnect completely from the internet. So nobody on the internet could see Facebook, Instagram, WhatsApp or any of their services. But not only that, this bug also cut off their internal access to their systems. So they could not even see their own email or messaging systems internally and this also prevented the engineers who had made the change from being able to get access to the equipment that they put the change onto and to try and reverse it.</p>
<h3>Lessons from the Facebook Outage</h3>
<p>So what can we learn about this? Well, I suppose the thing is, the way Facebook are set-up, they seem to have everything is in one big giant bubble that they all use internally. So all their eggs are in one basket. But if you were in an environment where a change like that could take out your entire environment, you might want to consider having some other alternatives that are not based on your internal network.</p>
<h3>What could you use</h3>
<p>So instead of using WhatsApp you might consider using something like Signal for messaging or even come back to good old fashioned text messages. Have some other kind of, what they call, out-of-band way of being able to communicate internally and be able to get around any kind of outage like this that might occur.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-098-lessons-from-the-facebook-outage/">#WeekendWisdom 098 Lessons from the Facebook Outage</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-098-lo.mp4" length="34684577" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 097 Record Number of Zero Days</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 05:15:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[0 Days]]></category>
		<category><![CDATA[0Days]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[ODays]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Record Number of 0 Days]]></category>
		<category><![CDATA[Record Number of Zero Days]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero Days]]></category>
		<category><![CDATA[ZeroDays]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2618</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 97. This week we&#8217;re going to talk about record number of zero days. More on Zero Days? In last week&#8217;s #WeekendWisdom number 96, I explained what a zero day was. The reason I brought up this topic in the first place was because, as at that date, 2021 had already become&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/">#WeekendWisdom 097 Record Number of Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 97. This week we&#8217;re going to talk about record number of zero days.<span id="more-2618"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2618-4" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4</a></video></div>
<h3>More on Zero Days?</h3>
<p>In last week&#8217;s <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/" target="_blank" rel="noopener">#WeekendWisdom number 96</a>, I explained what a zero day was. The reason I brought up this topic in the first place was because, as at that date, 2021 had already become a year where there was a record number of zero days being detected.</p>
<h3>How is it a record number of zero days?</h3>
<p>The number that was reported then was like 66 zero days:</p>
<ul>
<li>20 were associated with Microsoft products</li>
<li>15 zero days were associated with Apple products, which people think Apple is the most secure platform &#8230; maybe not</li>
<li>Google had 11 zero days</li>
</ul>
<p>So previous years there might have been 40 or 50 zero days detected in the whole year. But here we are still in September and we&#8217;ve already blown through those records.</p>
<p>Even in just the last week since I recorded the last #WeekendWisdom, there have been four more zero days detected. Three of them associated with Apple products and one with Google Chrome.</p>
<p>So this really is turning out to be a year of the zero days. They really are happening a lot.</p>
<h3>How do you protect yourself</h3>
<p>So please folks be sure that you put in place good robust patching process to make sure you keep all your software up to date as early as possible. Also do things like keep your backups, do good backups, test the backups to make sure that you can recover from those backups and also make sure you train your staff. But keep your software patched.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-097-record-number-of-zero-days/">#WeekendWisdom 097 Record Number of Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-097-lo.mp4" length="33914833" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 096 Zero Days</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Sep 2021 07:15:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[0 Days]]></category>
		<category><![CDATA[0Days]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[ODays]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Days]]></category>
		<category><![CDATA[ZeroDays]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2612</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days. Where is this coming from? Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical. You see when security researchers are analysing various software like&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days.<span id="more-2612"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2612-5" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical.</p>
<p>You see when security researchers are analysing various software like Microsoft, Apple and Google products, if they discovery a vulnerability in that software, they will report it to the vendor and give them an opportunity to rectify it and fix it before they make it public. They usually give them a period of months, normally it is usually 3 months.</p>
<h3>What are Zero Days?</h3>
<p>But in the case of zero days what happens is that a vulnerability is exposed on a day when nobody is aware of it until everybody is suddenly aware of it, including the vendor and including criminal gangs.</p>
<p>These cyber criminal gangs will immediately start looking to try and exploit that zero day vulnerability, while the vendors are rushing to try and fix it, to put out an update to fix that vulnerability.</p>
<p>That can take time. It can take days, it could take weeks to fix it. So it&#8217;s kind of a race against time for the cyber criminals to try and crack it and exploit it and for the vendors to fix it and update it.</p>
<h3>What should you do?</h3>
<p>So if you ever hear me talking about &#8220;There’s a zero day vulnerability out there that you need to patch!&#8221;, you should be looking to try and patch that as quickly as possible.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4" length="31106775" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 095 Why Updates are Important</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 07:15:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Why Updates are important]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2607</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important. This sounds familiar Waaaay back in the early days of the #WeekendWisdom series, back at number 3, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important.<span id="more-2607"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2607-6" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4?_=6" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Waaaay back in the early days of the #WeekendWisdom series, back at <a href="https://www.l2cybersecurity.com/weekendwisdom-003-updates/" target="_blank" rel="noopener">number 3</a>, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video.</p>
<p>The events of the last week has brought it back to me that this really is an important topic that we all need to be aware of.</p>
<h3>What happened this last week?</h3>
<p>Apple, earlier this week, released updates to its iPhones and Mac computers and watches that plugged a vulnerability which was being exploited by a surveillance software maker which literally all they had to do if they wanted to take control of somebody&#8217;s iPhone we&#8217;ll say, all they need to do is send a message to that phone and just when the phone receives the message, they now have control of it. The user of the phone did not have to do anything. So that&#8217;s pretty scary.</p>
<p>Also there was the vulnerability that I talked about in <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/" target="_blank" rel="noopener">last week&#8217;s #WeekendWisdom</a>. Microsoft have issued updates for that this week. So again, it&#8217;s really critical that if you have updates waiting on your Windows computer to apply them.</p>
<h3>This is the reason why updates are important</h3>
<p>You see the problem here is that when the likes of Apple or Microsoft issue updates, criminals go and take those updates, they look at them and they find out what exactly has been fixed in Windows or in the iPhones or whatever. Then they can figure out how they can exploit that, that vulnerability that was there that was fixed. If people don&#8217;t do the updates, the criminals can now exploit them, for those people who don&#8217;t, because there are quite a lot of people who don&#8217;t apply updates.</p>
<p>But it&#8217;s really important that you do.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4" length="34691857" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 094 How to remove Internet Explorer</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 07:15:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[How to remove IE]]></category>
		<category><![CDATA[How to remove Internet Explorer]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[IE Retirement]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Internet Explorer Retirement]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2602</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer. Why would you want to do this? Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer.<span id="more-2602"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2602-7" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4?_=7" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4</a></video></div>
<h3>Why would you want to do this?</h3>
<p>Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see there is a vulnerability in it that can be exploited by somebody sending you a malicious word document. That all you have to do is open the document. You don&#8217;t need to take any other action, like click enable content or any other thing. Opening the document will exploit this vulnerability and cause malicious code to be run on your computer.</p>
<h3>Check if you should first</h3>
<p>Now before you take any of these steps, please check with your IT support that you really don&#8217;t need to use Internet Explorer anymore or that you&#8217;re allowed to remove it. So please check first.</p>
<h3>How to remove Internet Explorer</h3>
<p>This is how you get rid of it.</p>
<ol>
<li>Go down to the bottom left hand corner and click the start button and select settings.</li>
<li>Click Apps.</li>
<li>Then click Optional features.</li>
<li>Find Internet Explorer, click on it and click uninstall.</li>
<li>Then when you see this thing and it&#8217;s finished, reboot your computer.</li>
</ol>
<p>Once it comes back up again, you should be safe.</p>
<h3>What if you need Internet Explorer?</h3>
<p>If you really do need to use Internet Explorer for some legacy application or something like that, there is an Internet Explorer mode in the Microsoft Edge browser. Google that and find out how you can use that mode.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4" length="32134340" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 093 Botnets</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-093-botnets/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 03 Sep 2021 07:15:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Devices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attack]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2597</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets. You&#8217;ve mentioned these before Back in #WeekendWisdom number 76, where I talked about connecting devices to the internet and #WeekendWisdom number 84, where I talked about distributed denial-of-service attacks, I mentioned botnets. What are botnets? A botnet is a collection of a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 93. This week were going to talk about Botnets.<span id="more-2597"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2597-8" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4?_=8" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4</a></video></div>
<h3>You&#8217;ve mentioned these before</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom number 76</a>, where I talked about connecting devices to the internet and <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/" target="_blank" rel="noopener">#WeekendWisdom number 84</a>, where I talked about distributed denial-of-service attacks, I mentioned botnets.</p>
<h3>What are botnets?</h3>
<p>A botnet is a collection of a large amount of compromised devices that are connected to the internet.</p>
<h3>How do they get formed?</h3>
<p>There are legitimate services out there that scan the entire internet and every device that is connected to it and it keeps a database of all these devices.</p>
<p>Criminals then using these legitimate services are able to tailor their searches and locate:</p>
<ul>
<li>CCTV cameras</li>
<li>Baby monitors</li>
<li>Digital video recorders</li>
<li>In-house IP cameras</li>
<li>Any other type of device that may be connected to the internet in a very insecure manner</li>
</ul>
<p>If they can detect these through this database, what they can do then is compromises it using maybe:</p>
<ul>
<li>Default credentials</li>
<li>Known compromise</li>
<li>Weak vulnerabilities</li>
</ul>
<p>in those devices. Take them over, add them to their botnet and then they have control of these devices. They give them instructions to carry out a distributed denial of service attack.</p>
<p>So that&#8217;s how these botnets get formed.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-093-botnets/">#WeekendWisdom 093 Botnets</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-093-lo.mp4" length="30869996" type="video/mp4" />

			</item>
	</channel>
</rss>
