Skip to content
A Bag of Spanners - Planning and Preparation Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
spanners and tools

A Bag of Spanners – Planning and Preparation

Planning and Preparation – RANSOMWARE PART 2* Following my article last week, where we looked at the important role “coffee**” … Read more

Categories Cyber Security Tags governance, Octagon Technology, planning, planning and preparation, policies and procedures, ransomware, training
credentials

Credential Sharing and Passwordless

Last time I wrote about the advantages of a passwordless environment and how opting into passwordless authentication would benefit your … Read more

Categories Cyber Security Tags AAA, accountability, authentication, credential sharing, credentials, cyber security, insider threat, passwordless authentication, passwordlessness, passwords
passwordlessness

Something better than a password – passwordless Authentication

Passwordless As promised passwordless authentication or “passwordlessness”. I think I may have made that word up – but it conveys … Read more

Categories Cyber Security Tags authentication, Fast Identity Online, FIDO, passwordless authentication, passwordlessness, passwords
macros cyberawake

Microsoft Office Macros Are Still an Issue

I wrote about the Microsoft back and forth over disabling Microsoft Office macros last year and the risk that the … Read more

Categories Cyber Security Tags cyber security, Cyber-Attack, cybersecurity, email, email threat, internet, malware, Microsoft, Microsoft 365, Microsoft Office, Microsoft Office macros, Office apps, phishing, social engineering, VBA macros
Microsoft Login

What is Credential Stuffing and why is it a problem for you?

Credential stuffing cyber attacks depend on one crucial mistake by the user – they just need to use the same … Read more

Categories Cyber Security Tags authentication, Credential Stuffing, cyber security, FIDO, MFA, Multi-Factor Authentication, passwords, policies and procedures, Smart Thinking Solutions, training
credit card

Take Care of the Credit Cards

This article about credit cards came about because of two things: The first was a conversation last year with a … Read more

Categories Website Security Tags Canada, credit cards, LCBO, Liquor Control Board of Ontario, web developers, web skimming, website security
blame

The Blame Game

I finished my last CyberAwake article with the following paragraph about blame: Just don’t blame your people if they click … Read more

Categories Governance Tags academic paper, blame, malware, Musarurwa, ransomware, Renaud, Zimmermann
Don’t Blame your Team - "Just Click Here" Cyber Awake

Don’t Blame your Team – “Just Click Here”

Today we are talking About Links. How realistic is the advice “don’t click on that link”? How many times in … Read more

Categories Cyber Security Tags anti-virus, credentials, MFA, Multi-Factor Authentication, National Cyber Security Centre, NCSC, training
an example of a phishing email

Sometimes a simple email may work for the bad guys

Why do hackers do what they do? It is impossible to determine exactly why a threat actor hacks a system … Read more

Categories Email Tags back-up, business email compromise, email, malware, phishing, Smart Thinking Solutions, State Sponsored Cyber Attacks
Christmas

Christmas cyber security advice

Working from Anywhere and Business Email Compromise If you are looking for something lighter because it is Christmas, can I … Read more

Categories Cyber Security Tags business email compromise, CEO, Christmas, hybrid working, Octagon Technology, policies and procedures, Smart Thinking Solutions
Older posts
Newer posts
← Previous Page1 … Page8 Page9 Page10 … Page12 Next →
Christmas cyber security advice Cyber Awake

Contact us for consultation

Wake up to cyber threats..

Christmas cyber security advice Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close