InfoSec / Cyber

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 19. Anti-virus/anti-malware

Anti-virus and anti-malware are essential tools that are designed to detect, prevent, and remove malicious software – collectively known as malware – that can infect your devices, compromise your data, and disrupt your operations. Just like your body needs an immune system to fight off infections, your digital devices need protection against cyber threats.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 18. Regular Updates: Patching Against Threats

In the fast-evolving world of cybersecurity, software, operating systems, and applications are constantly being refined, improved, and, crucially, secured. Regular updates, also known as patching, are not merely about gaining new features or improving performance; they are an absolutely critical cybersecurity practice. Neglecting updates is like leaving your digital doors wide open after a burglar has already identified the weak spots.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 17. Access Control: Managing User Privileges

In cybersecurity, access control for users is about ensuring that only authorised individuals can access specific systems, applications, and data, and only to the extent necessary for their role. This principle is often referred to as the "principle of least privilege"  – granting users the bare minimum permissions required to perform their job functions, and nothing more.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 11. Policies and Procedures: Cyber Blueprint

Cyber security has many levels; policies and procedures are about establishing clear rules, guidelines and processes that govern how information is handled within an organisation.  Well-defined policies and procedures serve as the blueprint for your cyber security program, ensuring consistent practices, reducing human error and providing a framework for accountability.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 10. Understanding Your Cyber Posture

Before you can effectively improve your cyber security, you must first understand where you are - Understand Your Cyber Posture. It involves a thorough evaluation of your existing security measures, identifying vulnerabilities, and understanding the risks you face.  You can't protect what you don't know you have or what weaknesses you might have hidden

Read more …

  1. October 8. How Can Your Organisation Prevent Ransomware Attacks?
  2. October 7: Under Attack: The Reality of Ransomware
  3. October 6: Cyber Action Plan and A Roadmap to Resilience
  4. October 5: Cyber Responsibilities - We're All in This Together
  5. October 4: When a Cyber Attack Hits
  6. October 3: Data Security, the Core of Protection
  7. October 2: Privacy Protection & Safeguarding Personal Data
  8. October 1: Welcome to Cyber Security Awareness Month!
  9. Nursery Cyber attack
  10. The NCSC Cyber Assessment Framework
  11. The Classroom's Dark Side: Cyber crime from the Classroom
  12. The Latest Cyber Threat: The "Murky Panda"
  13. Holiday Cheer or Cyber Fear? : Essential Pre-holiday Checks
  14. Social engineering + impersonation = Fraud ≡ cyber deception
  15. School cyber attack: Framlingham College, Suffolk
  16. Getting caught in the Scattered Spider web
  17. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  18. World Password Day
  19. Apple removes its highest level data security tool from UK customers
  20. The role of Passkeys in Cyber Resilience and Cyber Security
  21. Ransomware-Resistant Backups
  22. Effectively communicating during a cyber incident
  23. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  24. How does the recent global IT outage affect me?
  25. King's speech introduces new bills in relation to cyber security, smart data and digital information
  26. What's a Cyber Incident and what should we do?
  27. Free short cyber training for staff
  28. Children's mental health data leaked after a cyber attack
  29. Cyber Incident Review: The Benefits
  30. Cyber attack on a University
  31. Kent Councils Data Breach
  32. Phishing attacks targeting schools - alert from City of London Police
  33. Update on Advisory for Rhysida Ransomware
  34. The Crime in a Cyber Attack and a Data Breach
  35. NCSC Annual Review is published for 2023
  36. Learning from Data Breaches
  37. Windows 11 security ineffective against attacks on old devices
  38. International Counter Ransomware Initiative 2023 Joint Statement
  39. Resistant Cloud Backups
  40. Top Ten Cyber Security Misconfigurations
  41. ICO Reprimand: company suffered a ransomware attack
  42. The UK Online Safety Bill becomes an Act (Law)
  43. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  44. Ransomware, extortion and the cyber crime ecosystem
  45. Cyber Resource: The Cyber Resilience Centre Group
  46. Email and Security: ICO recent guidance
  47. What to do in the event of a Cyber Attack
  48. Cyber Crime: AI Generated Phishing Attacks
  49. Cyber Attack: Exam Boards
  50. VICE SOCIETY - Ransomware attacks on schools
  51. Be Cyber Aware: USB Sticks
  52. Cyber Insurance in the Public Sector
  53. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  54. Cyber Attack: Manchester University
  55. Cyber Attack: Leytonstone School
  56. Be Cyber Aware: Firewalls
  57. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  58. Cyber Attack: Dorchester School
  59. Types of Cyber Attacks: Password Attacks
  60. Be Cyber Aware: Why regular software updates are important
  61. Cyber Attack: Wiltshire School
  62. Keeping your IT systems safe and secure
  63. Why we recommend using PIN codes on printers
  64. Types of Cyber Attacks: DDoS Attacks
  65. Types of Cyber Attacks: Phishing
  66. Types of Cyber Attacks: The Insider Threat
  67. Why your data is profitable to cyber criminals
  68. Types of malware and how they are linked to data protection
  69. A guide to multi-factor authentication
  70. How a school fought back after a cyberattack
  71. Types of Cyber Attacks - Credential Stuffing
  72. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  73. The Education sector now at highest risk of cyber attacks
  74. Cyber Attacks
  75. Emails – good practice and minimising the risk of a data breach

Search