governance
Let’s Talk About WordPress
WordPress – according to its publicity – is the world’s most popular website builder. Consequently it is a juicy target … Read more
Cyber Security THE LAYER CAKE APPROACH
For the fiftieth article I am going take a “bitsa” look at your cyber security – bitsa this, bitsa that! … Read more
The Cyber Security Culture
What do I mean when I say “cyber security culture”? The next article here on CyberAwake will be the fiftieth … Read more
Incident Response Communications – Have You Got It Covered?
Incident response communications are something that is often overlooked. Organisations already rely on sophisticated, integrated platforms such as Microsoft 365 … Read more
Pull the Plug: But I haven’t got a plug!
This article is a response to a question I got about this article “Minimise the Damage – Planning and Preparation”. … Read more
Ransomware – A Primer
My Ransomware Mini-series came to an end this, with the tenth part being published here on CyberAwake looking at what … Read more
After Ransomware
Ransomware – It’s gone What spoilt your Monday morning – ransomware on the network – has now been cleaned out. … Read more
Before! – Ransomware Part 9
It is an odd title, but as I bring this ransomware mini-series to a close I want to go back … Read more
A Bag of Spanners – Planning and Preparation
Planning and Preparation – RANSOMWARE PART 2* Following my article last week, where we looked at the important role “coffee**” … Read more