Skip to content
It's the holidays and The Out of Office Message Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

academic paper

Loch Lomond May 2024

It’s the holidays and The Out of Office Message

I thought I would use one of my holiday snaps from earlier this year, for this article. To make it … Read more

Categories Cyber Security Tags academic paper, cyber security, cybersecurity, Microsoft, Microsoft 365, Microsoft Exchange, Microsoft Office, Out of Office notification, phishing, Smart Thinking Solutions, social engineering
encryption

From Encryption Ransomware to Extortion Ransomware Part II

This is part two of my piece on extortion ransomware. The first part is here – you should read it … Read more

Categories Latest Tags academic paper, cyber security, encryption, encryption ransomware, extortion ransomware, policies and procedures, ransomware, Smart Thinking Solutions
extortion ransomware

From Encryption Ransomware To Extortion Ransomware Part I

What is extortion ransomware? We are all familiar with the ransomware model – encryption malware corrupts your files and demands … Read more

Categories Cyber Security Tags academic paper, encryption ransomware, extortion ransomware, policies and procedures, ransomware, Smart Thinking Solutions
blame

The Blame Game

I finished my last CyberAwake article with the following paragraph about blame: Just don’t blame your people if they click … Read more

Categories Governance Tags academic paper, blame, malware, Musarurwa, ransomware, Renaud, Zimmermann
wordfence email banning an IP using admin

The Basics of Cyber Security – A quick look at OSINT and Redacting

We have all seen redacted documents – even if it is just in a movie a TV programme or on … Read more

Categories Cyber Security Tags academic paper, cyber security, cybersecurity, open source intelligence, OSINT, pdf, redacting
insider threat

Back again, because that insider threat has not gone away…

On Tuesday I started this short Insider Threat series with quickly setting the threat landscape and realising that protecting yourself … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, data leak, data theft, Information Management, information segregation, insider threat, policies and procedures, role based access control
insider threat

The Insider Threat – the threat landscape and the first steps…

No business can operate without trusting someone, somewhere. That is the insider risk. Even if you are a one person … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, data leak, data theft, information segregation, insider threat, role based access control
Where are the boundaries for your cyber security? Cyber Awake

Where are the boundaries for your cyber security?

There is only so much budget for your cyber security, so where you spend it needs to give you the … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, CCTV, cyber security, cybersecurity, data leak, Microsoft 365, OneNOte, paper, The Guardian
email attack

The Out-Of-Office Email and How It Compromises Your Organisation’s Cyber Security

Before heading out on our leave, we all use that handy feature in our email – the Out-of-Office (OOO) auto-reply … Read more

Categories Latest Tags academic paper, cyber security, cybersecurity, Microsoft, Microsoft 365, Microsoft Exchange, Microsoft Office, Out of Office notification, phishing, social engineering
cyber attacks

When technical cyber security fails you…

It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and … Read more

Categories Cyber Security Tags academic paper, anti-virus, cyber security, Cyber-Attack, cybersecurity, email, email threat, malware, phishing, research, social engineering, training
Older posts
Page1 Page2 Next →
When technical cyber security fails you… Cyber Awake

Contact us for consultation

Wake up to cyber threats..

When technical cyber security fails you… Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close