Security

By Grayde Bowen | 25/10/2022

WordPress Security Solutions

A website is often the front door to a business yet if not kept under control is easily compromised. WordPress is the most popular …

Read post

By Grayde Bowen | 11/10/2022

The Case For Legitimate Hacking

CyberUp is a campaign dedicated to updating the UK 1990 Computer Misuse Act to reflect modern computer security systems and how they are protected …

Read post

By Grayde Bowen | 27/09/2022

Google Search Vulnerabilities

Dorking is a legal but specialised sub-set of Google searching Google dorks are keyword searches that look for specific website content rather than searching …

Read post

By Grayde Bowen | 14/09/2022

Is CAPTCHA Redundant?

Is CAPTCHA Redundant? Automated routines aim to prevent bots flooding websites with unwanted activity but also drive away regular users and are readily bypassed …

Read post

By Grayde Bowen | 14/09/2022

Insider Threats

Insider Threats Social media is being used to entice loyal employees to reveal sensitive data An insider threat assumes that someone within an organisation …

Read post

By Grayde Bowen | 14/09/2022

Password Theft

Password Theft Passwords and accounts may be initially harvested by phishing or spoof websites. This is only the beginning of a well-established trade network …

Read post

By Grayde Bowen | 14/09/2022

Privileged Access Management

Privileged Access Management Privileged Access Management (PAM) builds on the base IT Security concept that a user should have the minimum privileges to do …

Read post

By Grayde Bowen | 14/09/2022

Artificial Intelligence and Network Security

Artificial Intelligence and Network Security How can Network security systems learn to identify when network traffic deviates from ‘normal’? Artificial Intelligence (AI) and Machine …

Read post

By Grayde Bowen | 14/09/2022

Battling the Botnets

Battling the Botnets Harmful botnet traffic may be approaching 20% of Internet traffic Botnets are not necessarily a bad thing.  Consider a SIEM (Security …

Read post

By Grayde Bowen | 14/09/2022

Tracking Cryptocurrency Scams

Tracking Cryptocurrency Scams Scammers are demanding payment in cryprocurrency but the nature of Blockchains means these transcations can be traced. Bitcoin and other cryptocurrency …

Read post

By Grayde Bowen | 14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Changes to the Directive on Security of Network and Information Systems The European Parliament has agreed on the concept of a new security law, …

Read post

By Grayde Bowen | 14/09/2022

Unifying Physical and Cyber Security

Unifying Physical and Cyber Security Data from physical security systems should not be seen as separate to that from network monitoring. A web search …

Read post

By Grayde Bowen | 14/09/2022

Running a Successful Phishing Simulation

Running a Successful Phishing Simulation Simulating a phishing attack can be part of staff security training and will increase awareness of genuine phishing threats. …

Read post

By Grayde Bowen | 14/09/2022

Calculating the Cost of a Databreach

Estimating the cost of data breaches. UK government studies aim to identify the financial costs of dealing with a data breach. The full financial …

Read post

By Grayde Bowen | 14/09/2022

Janet Updates Security Requirements

Janet Updates Security Requirements JANET (Joint Academic Network) is the computer network backbone used by UK Universities, Colleges and research centres. Updates have been …

Read post

By Grayde Bowen | 14/09/2022

Reacting to Ransomware

Reacting to Ransomware Ransomware continues to be a major threat to computer systems. Attacks on high profile users make the news headlines but there …

Read post

By Grayde Bowen | 14/09/2022

Ukrainian Cyber Threats

Ukrainian Cyber Threats The current (March 2022) conflict between Ukraine and Russia is expanding into cyberspace and may affect computer systems Worldwide Politically motivated attacks …

Read post

By Grayde Bowen | 14/09/2022

Zero Trust Security

Zero Trust Security Zero Trust is not a single off the shelf solution.  It is best thought of a buzzword that describes a strategy …

Read post

By Grayde Bowen | 14/09/2022

Nation State Cyber Attacks

Nation State Cyber Attacks No target is too insignificant for the big player hackers. Compared to the costs of conventional weapons; cyber is a …

Read post

By Grayde Bowen | 14/09/2022

Passwordless Authentication

Passwordless Authentication The need to remember and input passwords to access data may be coming to an end Passwords are a core issue in …

Read post

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories