Risk Assessments

Risk Assessments

Why should you do a risk assessment in the first place?  When we are approached about cybersecurity and someone asks what the first steps should be, the response is always the same; start with a risk assessment. Everyone should have a cybersecurity budget to work with. In most cases, you would be working with a […]

Tales from the Crypt

https://youtu.be/Hbs2Y3uaUfU We have a few fascinating stories from the trenches for you today as we delve into our crypt of memories! We do a lot of penetration testing and cybersecurity reviews at Samurai, and, unfortunately, people ignore our advice. This is quite strange when you consider the fact that we are paid to dispense information. And to […]

The Problem with SMS

problem with sms

SMS has been around since 1992. It is a very familiar and convenient technology to use, so it is easy not to understand the dangers it may present from a cybersecurity perspective. Vodafone created the first text message in 1992, and sadly, it has not progressed much in terms of how it works since then.  […]

Hacking the Brain

Hacking the brain

What is Brain Hacking?  Brain hacking is a particular affectation used to describe certain behavioural traits. As humans, we are so willing to open our brains and minds to a plethora of information from social media and the internet. We willingly allow our minds to be programmed to conform to how the creator of the […]

Brain-Computer Interfaces (BCI)

Brain-computer interfaces

This subject has caught many people’s attention, especially since Elon Musk created Neuralink and started talking about it. As we unpack this topic, it is crucial that we also look at the cybersecurity implications.  We have approximately 86 billion neurons in our brains, and each neuron consists of dendrites, somas, and axons. The dendrite processes information coming in, and the soma joins […]

Work from Home Cybersecurity Risks

Work from home cybersecurity threats

https://youtu.be/kndeE6NjNk4   The pandemic has caused a seismic shift in our daily lives. It has upended everything as we know it! Since it has become customary to be working from our kitchen tables, we need to explore the cybersecurity consequences of remote and home working.   Why should we be worried?  We are suddenly in a situation where employees […]

The Samurai CIPP/E Success

With the news of a public health crisis due to COVID-19 (in January), Samurai decided to work from home in order to limit any unnecessary contact. I, myself, was supposed to be travelling the wonderful terrain of New Zealand, however that aside, I get to write about a bit of good news in Samurai’s team, […]

HTTP vs. HTTPS: From the Outside, Looking In

This blog will cover the baseline for an understanding of HTTP and HTTPS. It will attempt to go as in-depth as possible, but I will most likely leave the more technical and complex things to our specialists as they will be able to explain in further detail. What is HTTP? HTTP (or Hyper Text Transfer […]

Network Segmentation and Host Isolation

Network segmentation is when you separate different network devices (PCs, printers and other network-enabled devices) from one large local area network (LAN). The separated groups are called Virtual LANs or VLANs. This is so different groups of systems cannot interact with others, this can stop malicious users or malware spreading throughout the network without restrictions. […]