Skip to content
Back again, because that insider threat has not gone away… Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

Cyber Security

insider threat

Back again, because that insider threat has not gone away…

On Tuesday I started this short Insider Threat series with quickly setting the threat landscape and realising that protecting yourself … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, data leak, data theft, Information Management, information segregation, insider threat, policies and procedures, role based access control
insider threat

The Insider Threat – the threat landscape and the first steps…

No business can operate without trusting someone, somewhere. That is the insider risk. Even if you are a one person … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, data leak, data theft, information segregation, insider threat, role based access control
VPN out of the office

More about VPNs

An important aspect of our cyber security awareness training and project implementation is getting people to understand that good governance, … Read more

Categories Cyber Security Tags coffee shops, holidays, iOS, iOS VPN, policies and procedures, Smart Thinking Solutions, travel, Virtual Private Network, VPN, working from anywhere
Where are the boundaries for your cyber security? Cyber Awake

Where are the boundaries for your cyber security?

There is only so much budget for your cyber security, so where you spend it needs to give you the … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, CCTV, cyber security, cybersecurity, data leak, Microsoft 365, OneNOte, paper, The Guardian
usb no

If you must use portable USB drives, then you must read this…

We discourage the use of USB drives both internally and by clients – the issues arising include: Japanese man loses … Read more

Categories Cyber Security Tags BBC, Bleeping Computers, data breach, data leak, data theft, encryption, insider threat, policies and procedures, SanDisk, training, trust, USB portable storage, Western Digital
AAA

Why you should care about the TLA AAA!

Let’s start this post by outlining what I mean by AAA: Authentication – Authorisation – Accountability Authentication. For even the … Read more

Categories Cyber Security Tags 2FA, AAA, accountability, authentication, authorisation, cyber security, cyber security investigation, cybersecurity, DFA, Dual Factor Authentication, information security, MFA, Multi-Factor Authentication, Simone Jeurissen MSc, Two Factor Authentication
coffee and work from anywhere

You Still Need Great Cyber Security Even When You Are Working Anywhere

Following my blog on Tuesday about VPNs and security when “working anywhere”, including on holiday, here is a revised version … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, COVID-19, cyber security, cybersecurity, London, Microsoft 365, policies and procedures, routers, Virtual Private Network, VPN, working from anywhere
VPN out of the office

Do you have a “work from anywhere” policy? We’ll start with a VPN.

“Working from anywhere” can mean working somewhere really nice – the photo is from a lake side cabin at Pine … Read more

Categories Cyber Security Tags AAA, policies and procedures, travel, Virtual Private Network, VPN, working from anywhere
macros cyberawake

Microsoft Office Macros – The Good, The Bad and the Ugly

The Good Diana (my partner at Smart Thinking Solutions) loves Microsoft Office macros and her financial Excel spreadsheets are liberally … Read more

Categories Cyber Security Tags email, email threat, Follina, internet, Melissa virus, Microsoft, Microsoft 365, Microsoft Office, Microsoft Office macros, Office apps, VBA macros
Cyber Secuirty - Ransomware Attack

If your plan to defeat ransomware is to pay up, then read on…

NCSC and the ICO say – Don’t pay the malware ransom. A couple of weeks back The National Cyber Security … Read more

Categories Cyber Security Tags cyber security, cybersecurity, ICO, National Cyber Security Centre, NCSC, ransomware, The National Cyber Security Centre
Older posts
Newer posts
← Previous Page1 … Page7 Page8 Page9 Next →
If your plan to defeat ransomware is to pay up, then read on… Cyber Awake

Contact us for consultation

Wake up to cyber threats..

What exactly do I mean when I say “ransomware resilient back-up”? Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close