Articles
We are always busy and when we get downtime we tend to spend it learning new things, however where we can we write up a quick summary or general advice for the common good.
The following articles are always a work in progress and is never the definitive answer or guidance on any topic, your business is unique and will need careful review to give any advice. Use at your own risk.
Industrial Control Systems (ICS)
Industrial control system and SCADA are a focus of hackers and nation states around the world.
Employees need to work from home unexpectedly?
If you don’t normally permit home working. There are a few things you need to think about.
Social Engineering Techniques
Technology can only help in a limited way against human hacking, being aware and being vigilant is your best defence against the methods described below..
File Extensions you should filter from email
File attachments received via email can be malicious, filter them out before they do damage.
Cyber Security Fundamentals : Availability
Availability? Availability is a key principle it ensure that our data will be available in a timely manner, if you can't access your data you no longer have data even if it meets the other two key fundamentals Confidentiality/Integrity, if you can't get to it when you...
Cyber Security Fundamentals : Integrity
Integrity Definition according to the oxford english dictionary: In information security, integrity is the principle that requires information to maintain its precision. The way we might maintain data integrity may include one or more of the following Checksums A...
Cyber Security Fundamentals : Confidentiality
Confidentiality, the requirement that particular ‘information’/ ‘data’ be restricted to the appropriate people/systems.
Cyber Security Fundamentals
Cyber security is about protecting your data, your information, which is in many cases the most valuable asset a business will own. Confidentiality, Integrity and Availability are the pillars beneath cyber security.
Stop script files being used against you
Why: Script files like Javascript are used by a number of different malicious attacks (think ransom) as a way to run code on your machine outside of the protection of an application, typically from email or website downloads, you can stop this quite easily. How: On...