Cyber 3-2-1: Third party risk management, good work vs fast work, and password insanity

Cyber 3-2-1: Third party risk management is no longer where the party is at; Hacking systems usually means hacking humans, especially those in your IT support team; And the insanity of password rules, according to Michael McIntyre.

What will you be seeing out there?

In a recent article, I discussed what I’m seeing within financial services firms and the regulations that are keeping them busy. So, what does this mean for businesses that sell to these firms? What will they be seeing?

Cyber 3-2-1: Supply Chain Risk training; Wi-Fi is under attack, and length matters.

Cyber 3-2-1: Free supply chain risk training from the UK’s NCSC, WiFi networks are under threat from drones, and why 7 letters can make all the difference when it comes to your password.

Cyber 3-2-1: Central Bank data breach, RMM tool security, and the mistakes that startups make

Cyber 3-2-1: The Central Bank of Ireland reminds us that data protection is not just about IT security. MSP + RMM is the perfect combination for cyber attackers. And startups are under attack from cyber attackers. And questionnaires!

Cyber 3-2-1: The cloud is someone else’s computer, your MSP could be your biggest security weakness, and attackers can now speak your language

Cyber 3-2-1: Danish hosting provider is hit by ransomware, Your IT MSP could be an attacker’s Most Successful Pathway into your systems, and Scammers can now speak your language.

Cyber 3-2-1: PSNI data breach, Shadow IT, and Microsoft is in the news again

Cyber 3-2-1: A significant data breach in the Police Service of Northern Ireland, the shadow of shadow IT keeps growing, and Microsoft’s security practises should not distract us from the need to secure our front doors.

Interview: Comparing DORA to the CBoI’s Guidance on Operational Resiliience

How does DORA compare to the Central Bank of Ireland’s guidance on operational resilience: An interview with Carina Myles of Eisner Amper.

Go to Top