W is for …

Whaling When people launching spear phishing attacks against senior members of staff, this is known as whaling (because they’re after the big fish). That’s the only real difference in the terms, though the types of attack may differ slightly. Whales are more likely to be the target for mandate fraud, where an email purporting to … Continue reading W is for …

P is for …

Password There has been much written about passwords, but for this entry I thought it worth defining what a password actually is. It’s a code, phrase or sequence of letters and numbers which is used to validate that you are who you say you are. It’s often used in conjunction with a username or when … Continue reading P is for …

G is for…

GDPR The General Data Protection Regulation (GDPR) is an EU regulation which sets out the minimum requirements for Data Protection in the EU. It is a bit more stringent than the Data Protection Act, which is the current legislation in the UK. The UK has been heavily involved in its development, and it will come … Continue reading G is for…

B is for…

Backup I’ve talked about these in a previous post, but essentially backups are copies of your data or computer which you can use to replace files which are inadvertently deleted, or as an alternative to paying the ransom in a ransomware attack. You should make backups on a regular basis, whether by simply copying your … Continue reading B is for…

Episode 2 – who are the Bad Guys?

This episode links to the item I wrote some time ago about who Hackers are and what their motivations are. I hope you enjoy it. If you do, why not subscribe to the YouTube channel so you get the latest releases as soon as they are posted. EasyCyber Episode 2