Author: user

  • Enhancing Endpoint Security with Windows LAPS and Intune 

    Enhancing Endpoint Security with Windows LAPS and Intune 

    In the continuously shifting tactics in cybersecurity, some of the most significant breaches originate from endpoints, making it essential for small to medium enterprises (SMEs) to strengthen their endpoint protection. There is no doubt that using Windows Local Administrator Password Solution (LAPS) together with Microsoft Intune is one of the…

  • A brief history of cybersecurity

    A brief history of cybersecurity

    The history of cybersecurity is a fascinating journey that reflects the ongoing battle between digital attackers and defenders. It traces back to the earliest attempts to safeguard digital systems from malicious intrusions. Over the decades, cybersecurity has evolved in tandem with advancements in technology and the emergence of new threats.…

  • How can I recognize and prevent phishing?

    How can I recognize and prevent phishing?

    Phishing is a serious threat to the online security of individuals and organisations. It is important to know how to recognise and prevent phishing. In this post, I share some tips to protect yourself from phishing attacks.

  • Maximizing Security Awareness: Do’s, Don’ts & Key Takeaways

    Maximizing Security Awareness: Do’s, Don’ts & Key Takeaways

    Duolingo-Inspired Learning Model Safety Science Compliance Box Ticking Effectiveness: Key Factors Conclusion In Summary We hope you found these tips on enhancing your small business’s cybersecurity useful. However, our guidance can only get you so far – we’re ready to understand your unique challenges and insights to improve our services.

  • Unmasking the Hidden Risk: Protecting New Employees Against Cyber Threats

    Unmasking the Hidden Risk: Protecting New Employees Against Cyber Threats

    It’s an exciting moment when new talent joins the team, bringing fresh perspectives and diverse skills. However, this transition also comes with challenges, particularly when it comes to cybersecurity. One of the primary risks that new hires face is susceptibility to cyber attacks, especially phishing attacks. Why New Employees are…

  • The Human Firewall: Rethinking Security Awareness and Training

    The Human Firewall: Rethinking Security Awareness and Training

    Cybersecurity awareness has become a significant concern for organizations worldwide as cyber-attacks continue to increase in frequency and sophistication. In a recent LinkedIn post, we shared a link to a video by Wallmart CISO, Ira Winkler, author of ‘Security Awareness for Dummies’ and ‘You Can Stop Stupid’, where he offers a fresh…

  • Overview of the Threat Landscape over the Last 6 Months in Europe

    Overview of the Threat Landscape over the Last 6 Months in Europe

    European nations cannot take the ongoing Russian-Ukrainian conflict lightly because both these countries are adept at fighting cyber wars. So, the cyber threat landscape will remain gloomy for Europe and globally until hostilities cease. Let’s see how the recent developments have impacted the threat landscape over the last six months…

  • Why Should You Be Switching To A Career In Cyber Security

    Why Should You Be Switching To A Career In Cyber Security

    In today’s fast-paced digital world, cybersecurity is a crucial aspect of any organization or individual’s online activities. With the rise of cyber threats such as hacking, phishing, and ransomware attacks, the demand for cybersecurity professionals has increased significantly. This has led many individuals to consider switching careers to cybersecurity. If…

  • Nine Security Tips for Your Office 365 Environment

    Nine Security Tips for Your Office 365 Environment

    Ensure all accounts enable Multi-Factor Authentication (MFA) Not requiring Multi-Factor Authentication (MFA) in your company is like not requiring a password in 2010. Enable MFA for all user & administrative roles. Verify using command-line by using this great PowerShell script. If you’re company has more that 5 global admins then…

  • E-mail scam targeting Gmail, Hotmail and Outlook

    E-mail scam targeting Gmail, Hotmail and Outlook

    In the recent couple of days/weeks, we have been noticing a lot more spam e-mails targeting Gmail, Outlook and Hotmail addresses. We received multiple messages a day. The spam collection mailboxes across different public domains (mainly Gmail, Hotmail, Outlook, …) all got heavily targeted, 5+ emails a day, with 100+…

  • Cybersecurity Awareness: Helping C-Suite Take A Proactive Cybersecurity Approach

    Cybersecurity Awareness: Helping C-Suite Take A Proactive Cybersecurity Approach

    The first and vital element to preventing cyber-attacks is training your employees. Since employees form the backbone of your business, investing in cybersecurity awareness will bring immense benefits. Read on to know more. Cybersecurity is the searing subject of every industry since the elevation of data breaches, malware, ransomware, and…

  • Improve Your Security Monitoring Capabilities with SecurityOnion

    Improve Your Security Monitoring Capabilities with SecurityOnion

    Anyone can start to build their own SIEM solution for free with SecurityOnion. While it is possible to run individual tooling and connect them together manually, SecurityOnion gives you an integrated tooling environment to quickly cover your bases and start hunting for possible threats. Due to the full package of…