Town dusts off typewriters after cyber-attack

This story appeared on the BBC website the other day. Basically the town’s borough council was hit with ransomware and their systems were brought to their knees. It’s not unusual for one or two devices in an organisation to be infected with Ransomware. Typically those devices are isolated from the network and all other machines … Continue reading Town dusts off typewriters after cyber-attack

M is for …

MacOS This is the Operating System used by Apple Macintosh desktop computers, not to be confused with that used by their smartphone and tablet devices which is iOS. Man in the middle (MITM) As the name suggests, this is a form of hacking where network traffic or messages are intercepted by someone sitting between the … Continue reading M is for …

Do you have privacy fatigue?

It’s a fact of life these days that we constantly seem to have people giving out dire warnings about being careful what information you share online, who can overhear you giving out your credit card numbers etc. It seems like we’re being warned that there are ears everywhere. Do you know what? There are. But … Continue reading Do you have privacy fatigue?

10 Steps to Cyber Security – Part 1 of 2

Through discussions with various clients and perspective clients, at conferences, events and forums, it is very apparent that a lot of companies know that they need to do “something about cyber” but many, particularly in the Small and Medium Enterprise (SME) arena, are unsure of what that something should be. My response to them is … Continue reading 10 Steps to Cyber Security – Part 1 of 2

How does your security measure up?

I published this article on LinkedIn on Monday 3rd July 2017, and I’ve copied it here for you. If you don’t know what you have, how can you measure it? We read a lot these days about equipment and training to help combat cyber attacks and reduce risks, but I don’t see much about today’s … Continue reading How does your security measure up?

Lesson to be learned from Wannacry Friday

This article was published on LinkedIn on 16th May 2017. I’ve copied it in its entirety for you here.  If you don’t know what you have, how can you protect it effectively? Last Friday, the world received a massive wake up call, in regards to the vulnerability of it’s computer systems, their interconnectedness and the … Continue reading Lesson to be learned from Wannacry Friday

What next after Friday’s Ransomware attacks?

Perhaps predictably, vendors of all sorts are appearing on LinkedIn and elsewhere selling their solutions to the mass attack of Friday. I presume they are hoping to cash in when work resumes for many tomorrow and we find that there may be additional victims from Friday.  There’s been a lot written by a lot of … Continue reading What next after Friday’s Ransomware attacks?

Global Cyber Attack – the Podcast

Earlier today I shared a post about yesterday’s cyber attack which affected so many devices across so many countries.  This is the podcast / video which accompanies it.   EasyCyber Special Edition Why not subscribe to my YouTube channel while watching this special edition, Episode 4 of this podcast will be published soon.  It’s all … Continue reading Global Cyber Attack – the Podcast

Global Cyber Attack 

Yesterday, May 12th 2017 saw a mass global cyber attack launched with impeccable timing just before the weekend. Over 75000 machines were affected in around 100 countries – so far.  It is believed that a hacking group called Shadow Crew is behind the attack. This is the same group that hacked the CIA in the … Continue reading Global Cyber Attack