Back door 1: The hard drive of your laptop
I recommended that we regularly review the security of the back doors in our IT systems. Back door #1: The hard disk on your Windows device.
I recommended that we regularly review the security of the back doors in our IT systems. Back door #1: The hard disk on your Windows device.
Cyber 3-2-1: Why a contract doesn’t matter until it’s the only thing that matters. Why the US Department of Defence wants you to do as they say, not do as they do. And why colleges may need to attend a Security 101 class. This week’s action: Check up on those with Access All Areas accounts.
When I work with a client for the first time, I frequently encounter a fractious relationship between the client and their IT MSP (managed service provider). There are numerous symptoms to the issue. But, at its core, it usually comes down to a lack of trust between the client and the IT MSP. And it's not always the IT MSP's fault.
Cybersecurity can feel like a blackhole of investment. There’s no end of technologies and vendors selling all kinds of solutions to the real, and perceived, risks. So, how do you know what appropriate security means for your organisation? That depends. But I can tell you what inappropriate looks like.
Cyber 3-2-1: How one business took 24 years to build and 24 hours to destroy, what the EU’s Agency for Cybersecurity has to say about supply chain attacks, why you should ask more questions about the security of your IT service providers, and why you should expect to be asked similar questions by your clients. This week’s action: Ask questions. Seek evidence.