Skip to content
Before! - Ransomware Part 9 Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

training

ready

Before! – Ransomware Part 9

It is an odd title, but as I bring this ransomware mini-series to a close I want to go back … Read more

Categories Cyber Security Tags business continuity, cyber security, Cyber Security Master Document, CyberAwake, governance, incident response, Incident Response Plan, Octagon Technology, planning and preparation, policies and procedures, ransomware, Smart Thinking Solutions, training
impact

Ransomware – The Impact

The Impact of Ransomware So the worst has happened. You come into work on a Monday morning early, to get … Read more

Categories Cyber Security Tags business continuity, cyber security, Octagon Technology, ransomware, Smart Thinking Solutions, training, USB portable storage
magnifying glass

Detecting Ransomware – Ransomware Part 4

Ransomware will not stop – the threat actors just make too much money from it. It does not matter what … Read more

Categories Cyber Security Tags anti-virus, back-up, blame, cyber security, Octagon Technology, planning and preparation, policies and procedures, ransomware, training
spanners and tools

A Bag of Spanners – Planning and Preparation

Planning and Preparation – RANSOMWARE PART 2* Following my article last week, where we looked at the important role “coffee**” … Read more

Categories Cyber Security Tags governance, Octagon Technology, planning, planning and preparation, policies and procedures, ransomware, training
Microsoft Login

What is Credential Stuffing and why is it a problem for you?

Credential stuffing cyber attacks depend on one crucial mistake by the user – they just need to use the same … Read more

Categories Cyber Security Tags authentication, Credential Stuffing, cyber security, FIDO, MFA, Multi-Factor Authentication, passwords, policies and procedures, Smart Thinking Solutions, training
Don’t Blame your Team - "Just Click Here" Cyber Awake

Don’t Blame your Team – “Just Click Here”

Today we are talking About Links. How realistic is the advice “don’t click on that link”? How many times in … Read more

Categories Cyber Security Tags anti-virus, credentials, MFA, Multi-Factor Authentication, National Cyber Security Centre, NCSC, training
phishing email

Don’t be tempted to open that zip file A story of a phishing email

I was away on leave last week so you would think I was not thinking about phishing emails and cyber … Read more

Categories Email Tags cyber security, Cyber-Attack, cybersecurity, email threat, malware, phishing, Smart Thinking Solutions, social engineering, training
usb no

If you must use portable USB drives, then you must read this…

We discourage the use of USB drives both internally and by clients – the issues arising include: Japanese man loses … Read more

Categories Cyber Security Tags BBC, Bleeping Computers, data breach, data leak, data theft, encryption, insider threat, policies and procedures, SanDisk, training, trust, USB portable storage, Western Digital
cyber attacks

When technical cyber security fails you…

It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and … Read more

Categories Cyber Security Tags academic paper, anti-virus, cyber security, Cyber-Attack, cybersecurity, email, email threat, malware, phishing, research, social engineering, training
cybersecurity

Why Should I Bother with Cyber Security Training for My Team?

“Everyone in any organisation has a role to play in the cyber security planning and implementation for that organisation, so … Read more

Categories Cyber Security Tags academic paper, anti-virus, cyber security, cybersecurity, data breach, email, email threat, malware, phishing, policies and procedures, ransomware, research, social engineering, spyware, threat landscape, training, UK Government, USB memory stick
Newer posts
← Previous Page1 Page2 Page3
Why Should I Bother with Cyber Security Training for My Team? Cyber Awake

Contact us for consultation

Wake up to cyber threats..

Why Should I Bother with Cyber Security Training for My Team? Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close