V is for …

VPN A virtual private network (VPN) is a form of network connection between two points which is encrypted. This helps protect the network traffic from being intercepted by others, and helps to keep the message secure. It’s a really good idea to use a VPN if you’re away from home eg in cafes or using … Continue reading V is for …

T is for …

Tailgating Tailgating is very easy to spot. It’s when you follow someone through a barrier without swiping your entry card, adding your pin number etc. You might have seen someone do this in a car park or elsewhere, following another vehicle in without paying: it’s the same principle. Trojan Taking its name from the Trojan … Continue reading T is for …

P is for …

Password There has been much written about passwords, but for this entry I thought it worth defining what a password actually is. It’s a code, phrase or sequence of letters and numbers which is used to validate that you are who you say you are. It’s often used in conjunction with a username or when … Continue reading P is for …

M is for …

MacOS This is the Operating System used by Apple Macintosh desktop computers, not to be confused with that used by their smartphone and tablet devices which is iOS. Man in the middle (MITM) As the name suggests, this is a form of hacking where network traffic or messages are intercepted by someone sitting between the … Continue reading M is for …

10 Steps to Cyber Security – Part 1 of 2

Through discussions with various clients and perspective clients, at conferences, events and forums, it is very apparent that a lot of companies know that they need to do “something about cyber” but many, particularly in the Small and Medium Enterprise (SME) arena, are unsure of what that something should be. My response to them is … Continue reading 10 Steps to Cyber Security – Part 1 of 2

How does your security measure up?

I published this article on LinkedIn on Monday 3rd July 2017, and I’ve copied it here for you. If you don’t know what you have, how can you measure it? We read a lot these days about equipment and training to help combat cyber attacks and reduce risks, but I don’t see much about today‚Äôs … Continue reading How does your security measure up?

I told you so…

Just thought I’d share this piece from the Hoax-Slayer website (great site to visit often, in my opinion) which basically confirms everything I said in my previous article on here. It’s good to know I wasn’t giving you false information!  Other things to look out for, which I hadn’t mentioned previously are: the sensationalist videos, … Continue reading I told you so…

Lesson to be learned from Wannacry Friday

This article was published on LinkedIn on 16th May 2017. I’ve copied it in its entirety for you here.  If you don’t know what you have, how can you protect it effectively? Last Friday, the world received a massive wake up call, in regards to the vulnerability of it’s computer systems, their interconnectedness and the … Continue reading Lesson to be learned from Wannacry Friday

What next after Friday’s Ransomware attacks?

Perhaps predictably, vendors of all sorts are appearing on LinkedIn and elsewhere selling their solutions to the mass attack of Friday. I presume they are hoping to cash in when work resumes for many tomorrow and we find that there may be additional victims from Friday.  There’s been a lot written by a lot of … Continue reading What next after Friday’s Ransomware attacks?

Global Cyber Attack – the Podcast

Earlier today I shared a post about yesterday’s cyber attack which affected so many devices across so many countries.  This is the podcast / video which accompanies it.   EasyCyber Special Edition Why not subscribe to my YouTube channel while watching this special edition, Episode 4 of this podcast will be published soon.  It’s all … Continue reading Global Cyber Attack – the Podcast