Skip to content
If you need some help with cyber security - look no further... Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
calm - cyber security culture

If you need some help with cyber security – look no further…

I am in a busy period helping several organisations with IT and Cyber Security Audits among other jobs. Because of … Read more

Categories Governance Tags cyber security, governance, policies and procedures, Smart Thinking Solutions, training
coffee makes for good planning and preparation

Practice Drinking Coffee* better known as Planning and Preparation

Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning … Read more

Categories Governance Tags back-ups, coffee, credentials, cyber security, Cyber-Attack, cybersecurity, email threat, governance, Longer Reads, malware, new articles, phishing, planning and preparation, ransomware, Smart Thinking Solutions, social engineering, training
credential management and identity theft

Identity Theft (part 2)

This is the second part to my article on identity theft and credentials – the first part is here:  Identity … Read more

Categories Cyber Security Tags credential theft, credentials, cyber security, CyberAwake, identity theft, MFA, Multi-Factor Authentication, Push Security, Ravie Lakshmanan, Smart Thinking Solutions, Snowflake, The Hacker News
BitLocker training

The BitLocker Recovery Key

I am going to ask a question later: “Do you have a secure record of your BitLocker recovery key?”  I … Read more

Categories Governance Tags anti-virus, BitLocker, cyber security, encryption, Microsoft, Smart Thinking Solutions, training, Windows
privacy

Privacy and Encryption

Over the past few weeks, I have been writing about privacy here – I have linked the articles below – … Read more

Categories Privacy Tags Bruce Schneier, cyber security, encryption, Privacy, Smart Thinking Solutions, technology, UK Government
privacy is the first step to better cyber security

More About Privacy

To continue our privacy theme of the last two weeks, today I am going to reprint an article I wrote … Read more

Categories Privacy
OSINT collects information from anywhere and everywhere

Open Source Intelligence – OSINT 

Last week I was looking at social media and privacy and I discussed some of the things I do and … Read more

Categories Latest Tags cyber security, open source intelligence, OSINT, policies and procedures, Privacy, Smart Thinking Solutions, web browsers
privacy

Social Media and Privacy

There has been a lot of talk over the past couple of weeks about the privacy of and the banning … Read more

Categories Privacy Tags cyber security, encryption, Google, governance, HBO, John Oliver, LinkedIn, Meta, Microsoft, Microsoft 365, OneDrive, policies and procedures, Privacy, Secrecy, Smart Thinking Solutions, social media, TikTok, YouTube
incident response

INCIDENT RESPONSE PLAN – “WHAT IF”

The New Year is a good time to review your business – we have been doing that and one of … Read more

Categories Cyber Security Tags cyber security, incident response, Microsoft 365, policies and procedures, Smart Thinking Solutions
start now on your insider threat project

Insider threat – A conclusion… (pt.7)

Today I am going to bring this Back to Basics Primer about the insider threat and what smaller organisations can … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, blame, data leak, data theft, governance, information catagorisation, information segregation, insider threat, patches, Principle Of Least Privilege, role based access control, Smart Thinking Solutions, updates
Older posts
Page1 Page2 … Page12 Next →
Insider threat – A conclusion… (pt.7) Cyber Awake

Contact us for consultation

Wake up to cyber threats..

Insider threat – A conclusion… (pt.7) Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close