InfoSec / Cyber

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 11. Policies and Procedures: Cyber Blueprint

Cyber security has many levels; policies and procedures are about establishing clear rules, guidelines and processes that govern how information is handled within an organisation.  Well-defined policies and procedures serve as the blueprint for your cyber security program, ensuring consistent practices, reducing human error and providing a framework for accountability.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 10. Understanding Your Cyber Posture

Before you can effectively improve your cyber security, you must first understand where you are - Understand Your Cyber Posture. It involves a thorough evaluation of your existing security measures, identifying vulnerabilities, and understanding the risks you face.  You can't protect what you don't know you have or what weaknesses you might have hidden

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 8. How Can Your Organisation Prevent Ransomware Attacks?

Preventing ransomware attacks requires a multi-layered approach.  Regular backups are crucial - ensure they are isolated and tested. Employee training is paramount; staff must be able to recognise a phishing attempt.  All software and systems should be updated to patch vulnerabilities.  Strong access controls and MFA for all accounts will prevent up to 89% of data beaches.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 7: Under Attack: The Reality of Ransomware

The headlines often focus on large organisations or governments falling victim to cyber attacks, such as M&S and the Co-op, however, there is an increasing number of attacks on schools and colleges.  A ransomware attack on a school can be particularly devastating, crippling operations, disrupting learning and putting sensitive student and staff data at risk.

Read more …

  1. October 5: Cyber Responsibilities - We're All in This Together
  2. October 4: When a Cyber Attack Hits
  3. October 3: Data Security, the Core of Protection
  4. October 2: Privacy Protection & Safeguarding Personal Data
  5. October 1: Welcome to Cyber Security Awareness Month!
  6. Nursery Cyber attack
  7. The NCSC Cyber Assessment Framework
  8. The Classroom's Dark Side: Cyber crime from the Classroom
  9. The Latest Cyber Threat: The "Murky Panda"
  10. Holiday Cheer or Cyber Fear? : Essential Pre-holiday Checks
  11. Social engineering + impersonation = Fraud ≡ cyber deception
  12. School cyber attack: Framlingham College, Suffolk
  13. Getting caught in the Scattered Spider web
  14. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  15. World Password Day
  16. Apple removes its highest level data security tool from UK customers
  17. The role of Passkeys in Cyber Resilience and Cyber Security
  18. Ransomware-Resistant Backups
  19. Effectively communicating during a cyber incident
  20. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  21. How does the recent global IT outage affect me?
  22. King's speech introduces new bills in relation to cyber security, smart data and digital information
  23. What's a Cyber Incident and what should we do?
  24. Free short cyber training for staff
  25. Children's mental health data leaked after a cyber attack
  26. Cyber Incident Review: The Benefits
  27. Cyber attack on a University
  28. Kent Councils Data Breach
  29. Phishing attacks targeting schools - alert from City of London Police
  30. Update on Advisory for Rhysida Ransomware
  31. The Crime in a Cyber Attack and a Data Breach
  32. NCSC Annual Review is published for 2023
  33. Learning from Data Breaches
  34. Windows 11 security ineffective against attacks on old devices
  35. International Counter Ransomware Initiative 2023 Joint Statement
  36. Resistant Cloud Backups
  37. Top Ten Cyber Security Misconfigurations
  38. ICO Reprimand: company suffered a ransomware attack
  39. The UK Online Safety Bill becomes an Act (Law)
  40. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  41. Ransomware, extortion and the cyber crime ecosystem
  42. Schools under Cyber Attack: September 2023
  43. Cyber Resource: The Cyber Resilience Centre Group
  44. Email and Security: ICO recent guidance
  45. What to do in the event of a Cyber Attack
  46. Cyber Crime: AI Generated Phishing Attacks
  47. Cyber Attack: Exam Boards
  48. VICE SOCIETY - Ransomware attacks on schools
  49. Be Cyber Aware: USB Sticks
  50. Cyber Insurance in the Public Sector
  51. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  52. Cyber Attack: Manchester University
  53. Cyber Attack: Leytonstone School
  54. Be Cyber Aware: Firewalls
  55. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  56. Cyber Attack: Dorchester School
  57. Types of Cyber Attacks: Password Attacks
  58. Be Cyber Aware: Why regular software updates are important
  59. Cyber Security Breaches Survey 2023
  60. Cyber Attack: Wiltshire School
  61. Keeping your IT systems safe and secure
  62. Why we recommend using PIN codes on printers
  63. Types of Cyber Attacks: DDoS Attacks
  64. Types of Cyber Attacks: Phishing
  65. Types of Cyber Attacks: The Insider Threat
  66. Why your data is profitable to cyber criminals
  67. Types of malware and how they are linked to data protection
  68. A guide to multi-factor authentication
  69. How a school fought back after a cyberattack
  70. Types of Cyber Attacks - Credential Stuffing
  71. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  72. End of Windows 8.1 Support
  73. The Education sector now at highest risk of cyber attacks
  74. Cyber Attacks
  75. Emails – good practice and minimising the risk of a data breach

Search