InfoSec / Cyber

Types of malware and how they are linked to data protection

Types of malware and how they are linked to data protection

Malware is malicious software designed to harm computer systems and is linked to data protection in several ways.

Malware can be used to steal or compromise sensitive data stored on a computer system or network. This data could include personal information, financial data, or confidential business information. In this sense, malware poses a significant threat to data protection, as it can lead to data breaches and other security incidents.

Malware can

Read more …

A guide to multi-factor authentication

A guide to multi-factor authentication

The main benefit of multi-factor authentication (MFA) is that it will enhance your organisation's security by requiring your users to identify themselves by more than a username and password.  This makes stealing your information harder for the average criminal. It provides an added layer of security and is one of the most effective ways to prevent unauthorised access as it requires additional validation of login credentials.  Over 80% of cyber breaches happen due to weak or stolen

Read more …

How a school fought back after a cyberattack

How a school fought back after a cyberattack

The following article talks about how a school thwarted a cyber attack, more through luck than judgement.  Our advice is for the whole organisation to be cyber aware and review how your organisation might respond when attacked.    The article gives ideas on how to begin making a cyber ready plan.

In October 2020 Kellett School was subject to a ransomware denial-of-service (DoS) attack orchestrated by a Russian criminal hacker group.  After the attack, a post m

Read more …

Types of Cyber Attacks - Credential Stuffing

Types of Cyber Attacks - Credential Stuffing

This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance

Read more …

Search