We don’t let children play with matches. So why do we let white goods manufacturers play with WiFi? Please give me one good use case for connecting your fridge, dishwasher, toaster, kettle, coffee machine, light bulb, door lock or thermostat to the internet. I can’t think of anything that doesn’t sound like a bad science … Continue reading Oh look, it’s the Internet of Shit
I think I might have mentioned recently that your main cyber risk is your own staff, and that it's more often carelessness than ill intentions. Apparently I was being clairvoyant again: yesterday Boeing notified the regulator that an employee had accidentally sent out the personal details of 36,000 staff in an email to his wife. Now Boeing has to pay for … Continue reading What was that about insider risk?
We learned last year that the Russian Carbanak hacking group were planning to target hospitality businesses. We learned this week that they’re succeeding, and extracting ransom (or causing disruption) at luxury hotels all over the place, including in Britain. What incredibly sophisticated technique are they using to penetrate security? Are there basements full of hollow-eyed … Continue reading Stop saying yes
I'm having a bit of a row with Garmin at the moment. They've decided to change their password policy, upping their complexity requirements so that they now require uppercase as well as lower case and a number. This is not a step forward. It means I have to change my password on a variety of … Continue reading Why do we even bother?
So, Yahoo! has been hacked, and 500m records abstracted, allegedly by a “state-sponsored” agency. Apart from worrying what you might have kept on Yahoo!, and whether using the same password for your social media account and your bank account was really a good idea, what does this mean for you? First off it’s a reminder … Continue reading What can you learn from the Yahoo! hack?
I’ve written about this before. UK power generation policy is broken, and the result is that our safety margin for electricity supply at times of high demand keeps getting thinner. The FT picked this story up today – so if you don’t believe me, perhaps you’ll believe them. What’s certain is that if you wait … Continue reading Winter is coming
Well I would say that, wouldn’t I? It’s how I make my living (sorry, couldn’t face doing the it/IT pun twice in three sentences). It’s true, though. Consider your line of business application. Probably cost a good deal to put in; probably has at least some hardware and software resilience – being mission-critical and all. … Continue reading Doing IT right costs money
“Fit and forget” – the siren call of the IT widget seller. Buy our thing, plug it in and it “just works”. For everyone else working in or with tech, this is fabulously attractive. One less thing to worry about. Trouble is, it’s not just the users who forget about the device. It’s the manufacturers, … Continue reading BYOD – bring your obsolete device
Bremain or Brexit? This isn’t a political blog, but it’s worth reminding ourselves of June 23rd’s implications for IT & cyber-security. Privacy and personal data Even if we leave the EU, we’ll still have to implement the General Data Protection Regulation, only to have to re-invent it later. If we want to trade with the … Continue reading In or out – the tech perspective
It’s not always about you. Sometimes hackers attack your network just to use it to attack other people. They’re not after your data or your money, and they’ll do everything they can to avoid you noticing so they can carry on using your resources. This used to be about botnets – when hackers use malware … Continue reading When you hack others without knowing it