Cyber 3-2-1: Data that doesn’t exist can’t be stolen
Cyber 3-2-1: Data that doesn't exist can't be stolen. You can't get the attackers out if you don't know how they got in. And Russia is no longer a cyber threat to the US.
Cyber 3-2-1: Data that doesn't exist can't be stolen. You can't get the attackers out if you don't know how they got in. And Russia is no longer a cyber threat to the US.
Cyber 3-2-1: Microsoft decides that security should a priority, but not before they release a security and privacy nightmare. Meanwhile, if they can't go to the Olympics, they don't want anyone else to go either.
Cyber 3-2-1: Ukraine’s responses to Russian cyber attacks remind us of the value of incident response preparation, DuckDuckGo may not be as privacy-centric as you might think, and why paying a ransom may only mean you’ll be paying one again (and sooner than you may think). This week’s action: Reduce the need for an incident response plan by writing one.
Cyber 3-2-1: DeFi enabled the perfect crime, CISA discovered cyber sabotage tools aimed at US energy sector, and a reminder that we need to keep all software up to date, not just Windows. This week’s action: Tell your staff about the brands the bad guys love.
Cyber 3-2-1: Could simulated phishing tests really make staff more likely to be fooled by a phishing email in the future? What the Russians have done to one of the world’s most successful ransomware gangs? What has ransomware and cryptocurrency got to do with North Korea? And what the hell is the metaverse anyway? This week’s action: Review your approach to phishing test simulations.
Cyber 3-2-1: How the BBC tried to track down some of the FBI’s most wanted Russian cyber attackers, how cyber attackers are making money simply through fear, and what NOT to do if you’re hit with ransomware. This week’s action: Secure your website.