QR Code Scams
QR Code Scams Mobile phones may open QR codes without checking if the content can be trusted. QR codes seemed to be going out …
Secure Data Deletion
Secure Data Deletion Deletion or overwriting is no longer a good enough solution to erase data from a computer In October 2021 Wired magazine …
Stopping Stalkerware
Stopping Stalkerware Stalkerware has grown out of applications designed to allow parents and guardians to monitor their children’s activity and theoretically prevent them from …
Rubber Duck Danger
Rubber Duck Danger USB drives have provided a challenge to network administrators for many years. Despite the growth in cloud storage, WiFi and cellular …
Location Data Privacy
Location Data Privacy Accurate information on population movement has become a marketable commodity and this has encouraged some shady practices amongst mobile app developers …
Shaken And Stirred
Shaken and Stirred The plan to block scam phone calls Hacks and scams often depend on gaining the trust of the mark. This is …
Lateral Spear Phishing
Lateral Spear Phishing A phishing email that comes from a recognised business contact is more likely to be opened than random spam. Phishing emails …
Desktop Sharing Woes
Desktop Sharing Woes Following on from Kindus’ blog on the unsecured risks of remote meetings it is time to consider the perils of sharing …
The Walls Have Ears
Homeworkers Beware – The Walls Have Ears During World War 2 the British government put up a range of posters on the theme of …
Vulnerability Management in the Age of Cyberattacks
For a twenty-first-century business, vulnerability management has become an essential part of day-to-day operations. Every application you use has vulnerabilities. Cybercriminals use these weaknesses …
The Ransomware Task Force
An International strategy to combat Ransomware Kindus has previously discussed the issues of Ransomware in 2018 and 2020. In 2021 the USA based Institute …
SMS Delivery Scams
SMS Delivery Scams Bogus missed delivery texts and emails can be used to harvest personal data and lead to fraudulent bank transactions COVID lockdowns …
The Risk Register
Evaluating and tracking security risks and remediations As COVID 19 restrictions are relaxed organisations need to analyse the risks in the way individuals meet …
The Impact of GDPR
The UK adopted GDPR legislation as law in 2018. How effective has it been? Although Brexit has come and gone GDPR is still in …
Mobile Device Management
BYOD (Bring Your Own Device) has become MDM (Mobile Device Management). Within a corporate environment users will want to have access to phones and …
Bug Bounty Hacking
Hacking of a security system is a criminal offence. The activity only exists because vulnerabilities still exist in computer systems. It is virtually impossible …
Lockdown Cybercrime Data In The UK
UK government data shows how computer crime and fraud in general has affected us during COVID and the related lockdown. The Office For National …
Remote Working And Cybersecurity Risks In A Post COVID-19 World
COVID-19 has proved to be the Waterloo of many businesses globally. However, the industry has been quick to respond. The pandemic has triggered a …
Are you delivering Information Security training and awareness effectively?
The most effective way to minimise breaches of information security is to maximise staff awareness of risks and to promote good working practice. The …
COVID-19 Cyber Threat Awareness
Cyber criminals are exploiting COVID-19 The impact of COVID-19 on our way of life has been unprecedented. For the cyber criminal it has been …