V is for …

VPN A virtual private network (VPN) is a form of network connection between two points which is encrypted. This helps protect the network traffic from being intercepted by others, and helps to keep the message secure. It’s a really good idea to use a VPN if you’re away from home eg in cafes or using … Continue reading V is for …

H is for…

Hacking I’m pretty sure that you’ve all heard the term “hacking”, and you probably know that it has negative connotations. But what exactly is it? Put simply, it’s trying to get access to a computer or network using vulnerabilities in the security of the target. Note that I don’t necessarily say software: people can be … Continue reading H is for…

F is for…

Firewall Computers talk to each other using different protocols (these are just different formats for messages) and different protocols use different ports. Common protocols include http, which is used by most internet traffic, https which is an encrypted version of http, or FTP which is used for file transfers (File Transfer Protocol). Http uses port … Continue reading F is for…

10 Steps to Cyber Security – Part 1 of 2

Through discussions with various clients and perspective clients, at conferences, events and forums, it is very apparent that a lot of companies know that they need to do “something about cyber” but many, particularly in the Small and Medium Enterprise (SME) arena, are unsure of what that something should be. My response to them is … Continue reading 10 Steps to Cyber Security – Part 1 of 2

Certified Ethical Hacker

In spring 2013 I attended a Certified Ethical Hacker (CEH) training course with Firebrand in Wyboston, England. It was a week long bootcamp, with classes starting on the Sunday evening, 12 hour days in the classroom and a 3 hour exam on the Friday morning. The classes were made up of a mixture of theory … Continue reading Certified Ethical Hacker