Security

By Grayde Bowen | 14/09/2022

QR Code Scams

QR Code Scams Mobile phones may open QR codes without checking if the content can be trusted. QR codes seemed to be going out …

Read post

By Grayde Bowen | 14/09/2022

Secure Data Deletion

Secure Data Deletion Deletion or overwriting is no longer a good enough solution to erase data from a computer In October 2021 Wired magazine …

Read post

By Grayde Bowen | 14/09/2022

Stopping Stalkerware

Stopping Stalkerware Stalkerware has grown out of applications designed to allow parents and guardians to monitor their children’s activity and theoretically prevent them from …

Read post

By Grayde Bowen | 14/09/2022

Rubber Duck Danger

Rubber Duck Danger USB drives have provided a challenge to network administrators for many years. Despite the growth in cloud storage, WiFi and cellular …

Read post

By Grayde Bowen | 14/09/2022

Location Data Privacy

Location Data Privacy Accurate information on population movement has become a marketable commodity and this has encouraged some shady practices amongst mobile app developers …

Read post

By Grayde Bowen | 14/09/2022

Shaken And Stirred

Shaken and Stirred The plan to block scam phone calls Hacks and scams often depend on gaining the trust of the mark. This is …

Read post

By Grayde Bowen | 14/09/2022

Lateral Spear Phishing

Lateral Spear Phishing A phishing email that comes from a recognised business contact is more likely to be opened than random spam. Phishing emails …

Read post

By Grayde Bowen | 14/09/2022

Desktop Sharing Woes

Desktop Sharing Woes Following on from Kindus’ blog on the unsecured risks of remote meetings it is time to consider the perils of sharing …

Read post

By Grayde Bowen | 14/09/2022

The Walls Have Ears

Homeworkers Beware – The Walls Have Ears During World War 2 the British government put up a range of posters on the theme of …

Read post

By gabe | 14/09/2022

Vulnerability Management in the Age of Cyberattacks

For a twenty-first-century business, vulnerability management has become an essential part of day-to-day operations. Every application you use has vulnerabilities. Cybercriminals use these weaknesses …

Read post

By Grayde Bowen | 14/09/2022

The Ransomware Task Force

An International strategy to combat Ransomware Kindus has previously discussed the issues of Ransomware in 2018  and 2020. In 2021 the USA based Institute …

Read post

By Grayde Bowen | 14/09/2022

SMS Delivery Scams

SMS Delivery Scams Bogus missed delivery texts and emails can be used to harvest personal data and lead to fraudulent bank transactions COVID lockdowns …

Read post

By Grayde Bowen | 14/09/2022

The Risk Register

Evaluating and tracking security risks and remediations As COVID 19 restrictions are relaxed organisations need to analyse the risks in the way individuals meet …

Read post

By Grayde Bowen | 14/09/2022

The Impact of GDPR

The UK adopted GDPR legislation as law in 2018. How effective has it been? Although Brexit has come and gone GDPR is still in …

Read post

By Grayde Bowen | 14/09/2022

Mobile Device Management

BYOD (Bring Your Own Device) has become MDM (Mobile Device Management). Within a corporate environment users will want to have access to phones and …

Read post

By Grayde Bowen | 14/09/2022

Bug Bounty Hacking

Hacking of a security system is a criminal offence. The activity only exists because vulnerabilities still exist in computer systems. It is virtually impossible …

Read post

By Grayde Bowen | 14/09/2022

Lockdown Cybercrime Data In The UK

UK government data shows how computer crime and fraud in general has affected us during COVID and the related lockdown. The Office For National …

Read post

By Grayde Bowen | 14/09/2022

Remote Working And Cybersecurity Risks In A Post COVID-19 World

COVID-19 has proved to be the Waterloo of many businesses globally. However, the industry has been quick to respond. The pandemic has triggered a …

Read post

By gabe | 14/09/2022

Are you delivering Information Security training and awareness effectively?

The most effective way to minimise breaches of information security is to maximise staff awareness of risks and to promote good working practice. The …

Read post

By Grayde Bowen | 14/09/2022

COVID-19 Cyber Threat Awareness

Cyber criminals are exploiting COVID-19 The impact of COVID-19 on our way of life has been unprecedented. For the cyber criminal it has been …

Read post

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories