Cyber 3-2-1: Third party risk management is no longer where the party is at; Hacking systems usually means hacking humans, especially those in your IT support team; And the insanity of password rules, according to Michael McIntyre.
In a recent article, I discussed what I’m seeing within financial services firms and the regulations that are keeping them busy. So, what does this mean for businesses that sell to these firms? What will they be seeing?
The one question I get asked by board members is: “What are you seeing out there?” So, here’s my answer.
Cyber 3-2-1: Free supply chain risk training from the UK’s NCSC, WiFi networks are under threat from drones, and why 7 letters can make all the difference when it comes to your password.
The mass-exploitation of MOVEit Transfer software has rapidly cemented itself as the largest hack of the year so far. So what?
Cyber 3-2-1: The Central Bank of Ireland reminds us that data protection is not just about IT security. MSP + RMM is the perfect combination for cyber attackers. And startups are under attack from cyber attackers. And questionnaires!
You may think you have a great solution. But they think are a serious risk.
Cyber 3-2-1: The cloud is someone else’s computer, your MSP could be your biggest security weakness, and attackers can now speak your language
Cyber 3-2-1: Danish hosting provider is hit by ransomware, Your IT MSP could be an attacker’s Most Successful Pathway into your systems, and Scammers can now speak your language.
Cyber 3-2-1: A significant data breach in the Police Service of Northern Ireland, the shadow of shadow IT keeps growing, and Microsoft’s security practises should not distract us from the need to secure our front doors.
How does DORA compare to the Central Bank of Ireland’s guidance on operational resilience: An interview with Carina Myles of Eisner Amper.