6 rules to avoid disaster: a practical guide to phishing and spear-phishing

A chain is only as strong as its weakest link. Are you that link? Hackers don’t come in through the firewall. They come in, most of the time, through a much easier route: the staff. How? By exploiting basic psychology, and being prepared to do a little research. The easiest way to get someone’s password … Continue reading 6 rules to avoid disaster: a practical guide to phishing and spear-phishing

What a year it’s been – review of IT security 2014

By rights, 2015 should be the year of cyber security. After all, 2014 was the year of cyber-security failure. Just consider some of the highlights: Target Michaels JP Morgan Sony Pictures Viator Home Depot Goodwill Nieman Marcus US Postal Service iCloud (if none of the others mean anything to you, this one will. Just think … Continue reading What a year it’s been – review of IT security 2014

PRISM: will the cure be worse than the disease?

Now here’s a thing. As a private citizen, are you horrified or reassured by the revelations that the American NSA has been intercepting and monitoring internet traffic wholesale? I suspect you’re closer to appalled than comforted. Certainly, this is the public mood. The Europeans have been particularly vocal in expressing their concern at governmental level, … Continue reading PRISM: will the cure be worse than the disease?