InfoSec / Cyber

AI generated image of a key hole overlayed by a finger print on a cyber background. Data protection education logo on the bottom right of the image

The role of Passkeys in Cyber Resilience and Cyber Security

🗝️🛡️ In a world where cyber attacks are becoming increasingly sophisticated, protecting sensitive information and user accounts has never been more critical. Traditional passwords are rapidly being replaced by a more advanced and secure solution: passkeys. This article explores the benefits of passkeys, their role in preventing cyber attacks, and what to do if a system does not yet support them.

Read more …

Microsoft Copilot AI generated image of computers on a world with hackers by the side

How does the recent global IT outage affect me?

The recent news has been full of the global IT outage that affected many systems over the weekend, including airlines and patient access.  Although the incident was not caused by a cyber attack, it is important to note that it was a cyber incident which affects everyone.

A cyber incident is an event with threatens the confidentiality, integrity or availability of information systems, networks or the information they contain.

Review our previous article: What's a Cyber

Read more …

A computer screen with computer code. The word cyber attack in red in amongst the code

Cyber attack on a University

During February there have been a number of attacks reported on Universities in the UK.  There were reports of hackers attacking the universities of Cambridge, Manchester and Wolverhampton.  Systems were affected at all sites.  The disruption is the latest reported attack by Anonymous Sudan.  It is thought the attacks are related to the UK's support of Israel in the Gaza conflict.

Read more …

Data breach in orange text on a computer screen with computer text in blue

Kent Councils Data Breach

The ICO has confirmed a data breach from Kent councils.  The breach was reported by three Kent councils who share the same IT support provider.  Canterbury, Dover and Thanet councils continue to be hampered by the disruptions of onlines services following a cyber incident.

Read more …

  1. Phishing attacks targeting schools - alert from City of London Police
  2. Update on Advisory for Rhysida Ransomware
  3. The Crime in a Cyber Attack and a Data Breach
  4. NCSC Annual Review is published for 2023
  5. Learning from Data Breaches
  6. Windows 11 security ineffective against attacks on old devices
  7. International Counter Ransomware Initiative 2023 Joint Statement
  8. Resistant Cloud Backups
  9. Top Ten Cyber Security Misconfigurations
  10. ICO Reprimand: company suffered a ransomware attack
  11. The UK Online Safety Bill becomes an Act (Law)
  12. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  13. Ransomware, extortion and the cyber crime ecosystem
  14. Cyber Resource: The Cyber Resilience Centre Group
  15. Email and Security: ICO recent guidance
  16. What to do in the event of a Cyber Attack
  17. Cyber Crime: AI Generated Phishing Attacks
  18. Cyber Attack: Exam Boards
  19. VICE SOCIETY - Ransomware attacks on schools
  20. Be Cyber Aware: USB Sticks
  21. Cyber Insurance in the Public Sector
  22. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  23. Cyber Attack: Manchester University
  24. Cyber Attack: Leytonstone School
  25. Be Cyber Aware: Firewalls
  26. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  27. Cyber Attack: Dorchester School
  28. Types of Cyber Attacks: Password Attacks
  29. Be Cyber Aware: Why regular software updates are important
  30. Cyber Attack: Wiltshire School
  31. Keeping your IT systems safe and secure
  32. Why we recommend using PIN codes on printers
  33. Types of Cyber Attacks: DDoS Attacks
  34. Types of Cyber Attacks: Phishing
  35. Types of Cyber Attacks: The Insider Threat
  36. Why your data is profitable to cyber criminals
  37. Types of malware and how they are linked to data protection
  38. A guide to multi-factor authentication
  39. How a school fought back after a cyberattack
  40. Types of Cyber Attacks - Credential Stuffing
  41. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  42. The Education sector now at highest risk of cyber attacks
  43. Cyber Attacks
  44. Emails – good practice and minimising the risk of a data breach

Search