Cyber 3-2-1: You may be the next porn star, law firms need to upgrade their security defences, and SMEs need to close their front doors.

Cyber 3-2-1: Deepfakes are going mainstream, UK law firms have been warned about an increase in cyber attacks, and Irish SMEs need to close their front doors.

Cyber 3-2-1: A look at the 2023 Verizon Data Breach Investigation Report

Cyber 3-2-1: A look at the 2023 Verizon Data Breach Investigation Report: 95% of attackers are financially-motivated. Ransomware is one of their favourites, and email continues to be the most common way in.

Cyber 3-2-1: Irish doctors fear ransomware, Australian firms are under attack, and a €75 million fine in Sweden.

Cyber 3-2-1: Irish doctors are terrified about ransomware, Australian firms are under attack, and the Swedish regulator issues a €75 million sanction.

Cyber 3-2-1: Phishing remains the biggest threat, the board is talking about the wrong thing, and DORA just got easier.

Cyber 3-2-1: Phishing remains the biggest threat to businesses, the board is having the wrong conversations about cybersecurity, and navigating the content of the DORA regulation just got easier.

Cyber 321: 17th December 2021

Cyber 3-2-1: A report explains why the HSE attack was not sophisticated. The UK’s NCSC explains why the most severe computer vulnerability in years may have identified this week. And I ask why so little of your security budget is invested in improving your defences against more than 90% of attacks. This week’s action: Security is not just about technology. It’s about humans. Invest in your human defences.

By |2021-12-17T10:59:27+00:00December 17th, 2021|Categories: cybersecurity|Tags: , , , , , , , , |

Cyber 321: 15th April 2021

Cyber 3-2-1: Plain English cybersecurity advice in 3 articles, 2 statistics and 1 action, including how some firms handle crisis PR when they are victims of an attack, and how the bad guys love the things we share online. This week’s action: Identify your buddies – The experts you will need if you are the victim of an attack.

By |2022-02-14T08:38:52+00:00April 15th, 2021|Categories: cybersecurity|Tags: , , , , , , , , , |
Go to Top