InfoSec / Cyber

 A stylized image of a panda wearing a dark suit and tie, standing in a bamboo forest. The background is a mix of digital circuit patterns and glowing lights. At the bottom, a graphic overlay with the text, "IS THERE A 'MURKY PANDA' ON THE TIMETABLE? THE LATEST CYBER THREAT." The logo for "D NEWS" is in the bottom right corner.

The Latest Cyber Threat: The "Murky Panda"

The Murky Panda (also known as Silk Typhoon) is a cyber threat that has had significant activity since 2023 and has targeted government, technology, academic, legal and professional services. Currently there are reports of the threats only in North America, however, as the Murky Panda has previously targeted compromises in the cloud, it is assumed that they will easily transition to attacks further afield. The threat group is a China-nexus group

Read more …

Photo of a cat with leopard markings laying down on a white background underneath black text: Password Day, we suggest not using your pet's name for passwords! Data Protection Education DPO badge

World Password Day

🔒 It's World Password Day - a reminder to check how secure your passwords are and where you store that information.  There's a lot of password help and advice out there which can be confusing.  We highlight the basic things you need to be thinking about.

Read more …

AI generated image of a key hole overlayed by a finger print on a cyber background. Data protection education logo on the bottom right of the image

The role of Passkeys in Cyber Resilience and Cyber Security

🗝️🛡️ In a world where cyber attacks are becoming increasingly sophisticated, protecting sensitive information and user accounts has never been more critical. Traditional passwords are rapidly being replaced by a more advanced and secure solution: passkeys. This article explores the benefits of passkeys, their role in preventing cyber attacks, and what to do if a system does not yet support them.

Read more …

  1. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  2. How does the recent global IT outage affect me?
  3. King's speech introduces new bills in relation to cyber security, smart data and digital information
  4. What's a Cyber Incident and what should we do?
  5. Free short cyber training for staff
  6. Children's mental health data leaked after a cyber attack
  7. Cyber Incident Review: The Benefits
  8. Cyber attack on a University
  9. Kent Councils Data Breach
  10. Phishing attacks targeting schools - alert from City of London Police
  11. Update on Advisory for Rhysida Ransomware
  12. The Crime in a Cyber Attack and a Data Breach
  13. NCSC Annual Review is published for 2023
  14. Learning from Data Breaches
  15. Windows 11 security ineffective against attacks on old devices
  16. International Counter Ransomware Initiative 2023 Joint Statement
  17. Resistant Cloud Backups
  18. Top Ten Cyber Security Misconfigurations
  19. ICO Reprimand: company suffered a ransomware attack
  20. The UK Online Safety Bill becomes an Act (Law)
  21. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  22. Ransomware, extortion and the cyber crime ecosystem
  23. Schools under Cyber Attack: September 2023
  24. Cyber Resource: The Cyber Resilience Centre Group
  25. Email and Security: ICO recent guidance
  26. What to do in the event of a Cyber Attack
  27. Cyber Crime: AI Generated Phishing Attacks
  28. Cyber Attack: Exam Boards
  29. VICE SOCIETY - Ransomware attacks on schools
  30. Be Cyber Aware: USB Sticks
  31. Cyber Insurance in the Public Sector
  32. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  33. Cyber Attack: Manchester University
  34. Cyber Attack: Leytonstone School
  35. Be Cyber Aware: Firewalls
  36. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  37. Cyber Attack: Dorchester School
  38. Types of Cyber Attacks: Password Attacks
  39. Be Cyber Aware: Why regular software updates are important
  40. Cyber Security Breaches Survey 2023
  41. Cyber Attack: Wiltshire School
  42. Keeping your IT systems safe and secure
  43. Why we recommend using PIN codes on printers
  44. Types of Cyber Attacks: DDoS Attacks
  45. Types of Cyber Attacks: Phishing
  46. Types of Cyber Attacks: The Insider Threat
  47. Why your data is profitable to cyber criminals
  48. Types of malware and how they are linked to data protection
  49. A guide to multi-factor authentication
  50. How a school fought back after a cyberattack
  51. Types of Cyber Attacks - Credential Stuffing
  52. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  53. End of Windows 8.1 Support
  54. The Education sector now at highest risk of cyber attacks
  55. Cyber Attacks
  56. Emails – good practice and minimising the risk of a data breach

Search