Already being hailed as the largest ransomware outbreak in history, it has been reported by the BBC that over 150 countries have already been infected by the WannaCry ransomware. Allegedly stolen from US intelligence as part of a large collection of leaks, a so-called zero-day vulnerability was weaponised into a strain of ransomware – with the capability to spread without human interaction, a so-called worm….
Security Through Maturity
How's your posture?As many predictions including my own in 2016 demonstrated, email as an attack vector is back with a bang as business everywhere were attacked through phishing emails, tricking people into opening malicious links and bogus attachments – often leading directly to a data breach. Spear Phishing targets specific individuals and business units, the recent US election highlighted an example of this. There was also a…
Passwords are a pain. Needed for everything these days, you are constantly asked to register on this or that website in order to obtain the information you require, resulting in a mountain of credentials which need protecting. Some people use the same password for everything, others use stronger passwords for ‘important’ things. Some people work out what a password should be based on a system…
2016 has seen a renewed and sustained level of cyber threats which use email as the attack vector. If you’re not being coerced into clicking a link in a malicious email, then you may be invited to open an attachment, which will almost always require you to run macros or “enable content.” Macros, which appear in Office documents such as Microsoft Word or Excel, are…
Your users are the last line of defence and in almost all cases will make the difference between suffering a data security breach or not. As with disasters that can make the media, human error plays a major part during an incident. Users are the weakest link in the security chain, but if not empowered to make the right choice when they need to respond,…
Anyone who has some form of online presence will have logins and passwords for various systems that they connect to. Almost all systems that you log into now are on the internet and a great deal of them store a lot of personal information about you, such as your date of birth, home address, credit card details and so on. It has also become routine…