Why do we keep getting hacked? Having data leaked? Making the same mistakes? What’s wrong with us?!! Dr David Day does his best to fathom it out in half an hour.
When researching questions that are currently asked about cybersecurity, I came across ‘will cybersecurity ever die out?’ I found this question to be interesting as it’s a complex and rather odd question but, the more I think about it, the more interested I get so… Will Cybersecurity Ever Die Out? In short, no, and especially […]
Two popular questions by unseasoned cybersecurity researchers are ‘who does cybercrime affect’ and ‘why is cybersecurity important’? So, today, I’m going to walk you through the answers to these questions. Who does cybercrime affect? Cybercrime can affect anyone, whether you’re the attacker or an unfortunate victim. The more you do online, the more likely you […]
We’ve directed you on how you can recover after a breach but we all know that prevention is the best cure so here are some tips to preventing a cybersecurity breach. Passwords Passwords are critical when protecting your sensitive data so it’s important to keep them strong and up to date. To keep the hackers […]
Step 1: Conclude You’ll need to ensure that all of your networks and devices are working properly after the breach. You’ll probably end up changing passwords, wiping infected devices and patching your existing hardware. You may, also, want to invest in a trustworthy cybersecurity software package or go through the vulnerabilities of your system with […]
1. Identifying Threats Understand what threats can come from outside of your organisation. This may seem obvious but it’s important to understand these threats and not just be ware of them. It’s also important to understand what internal threats could jeopardise you. These can be caused by inappropriate usage of networks or a sheer lack […]
On the 15th of July, an unexpected Twitter hack saw the accounts of Elon Musk, Barack Obama, Joe Biden, Jeff Bezos, Bill Gates and more fall into the hands of hackers who used that access to push a bitcoin scam. The hackers, also, accessed 36 DM (direct message) inboxes, including one for an elected official […]
The latest podcast was a short one due to us trying to fit it into a busy schedule but we got one out which is the main thing. We discussed end-to-end encryption, if we need it and why, as well as covering the EncroChat hack from the very beginning of the month. The controversy surrounding […]
This week Neil, David and Jay discuss whether teleconferencing tools require end-to-end encryption. The NCA bust via compromising EncroChat, before reopening the whole security vs privacy debate.
Covid has put everyone in awkward situations. Businesses are in a difficult position right now, with many employees having to use their own devices and working from home. IT security measures are both more important than ever and more difficult to enforce. More than half of IT teams believe they are either under-equipped or still […]