Posts Tagged ‘Defence in Depth’
How to deal with Ransomware.
I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either…
Read MoreVulnerable Shopping Carts lead to Credit Card breaches
You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach…
Read MorePosh POS was Compromised
A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &…
Read MoreSimple Security Planner tool for EVERYONE!
I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your…
Read MoreQuad9 – Safer addressing on the internet
I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make…
Read MoreThe latest Ransomware outbreak – Petya
So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling…
Read MoreDo you WannaCry? I didn’t think so.
I delayed this week’s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn…
Read MoreTake a 2-Minute Privacy check-up.
After last week’s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I…
Read MoreProtect your on-line accounts, but not with text messages.
As I outlined here, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of protecting yourself from the evil doers is to use,…
Read MoreThe Ten Commandments of Cyber Security
The Ten Commandments of Cyber Security Click on the links for a summary and detail of each commandment.
Read MoreX. Thou shalt only use the official app store for apps.
Summary: This commandment is more targeted at the mobile device side of technology, but app stores are spreading into the desktop/laptop areas by way of Windows Store for Windows 8.1…
Read MoreIX. Thou shalt never insert nor allow to be inserted, a USB memory stick that thy hath never had complete control of since it was removed from its packaging.
Summary: This is an easy commandment to follow, but there might be temptation to breach it for convenience. If you find a USB memory stick on the street or in…
Read MoreVIII. Thou shalt never reveal thine password for any account to anyone.
Summary: This is one that should be an absolute no-brainer. Your password is your key to your data and applications. It should be absolutely sacrosanct and known only to yourself…
Read MoreVII. Thou shalt use two factor authentication on any account that provides the facility.
Summary: What is two factor authentication? Put simply it is a way of gaining access to an application by using two means of verifying the identity of the person requesting…
Read MoreVI. Thou shalt encrypt all data stored on thine mobile devices.
Summary: Your data is valuable to you. Even something as simple as the phone numbers in your phone’s contact app. It’s also valuable to the evil doers. They would dearly…
Read More