InfoSec / Cyber

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 8. How Can Your Organisation Prevent Ransomware Attacks?

Preventing ransomware attacks requires a multi-layered approach.  Regular backups are crucial - ensure they are isolated and tested. Employee training is paramount; staff must be able to recognise a phishing attempt.  All software and systems should be updated to patch vulnerabilities.  Strong access controls and MFA for all accounts will prevent up to 89% of data beaches.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 7: Under Attack: The Reality of Ransomware

The headlines often focus on large organisations or governments falling victim to cyber attacks, such as M&S and the Co-op, however, there is an increasing number of attacks on schools and colleges.  A ransomware attack on a school can be particularly devastating, crippling operations, disrupting learning and putting sensitive student and staff data at risk.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 4: When a Cyber Attack Hits

Even with the robust preventative measures, cyber attacks can happen.  The key is is not to panic and to have a plan, most organisations will call this a cyber incident response plan.  Knowing what to do in the immediate aftermath can significantly mitigate the damage, limit data loss and speed up recovery.

Read more …

  1. The Latest Cyber Threat: The "Murky Panda"
  2. Holiday Cheer or Cyber Fear? : Essential Pre-holiday Checks
  3. Social engineering + impersonation = Fraud ≡ cyber deception
  4. School cyber attack: Framlingham College, Suffolk
  5. Getting caught in the Scattered Spider web
  6. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  7. World Password Day
  8. Apple removes its highest level data security tool from UK customers
  9. The role of Passkeys in Cyber Resilience and Cyber Security
  10. Ransomware-Resistant Backups
  11. Effectively communicating during a cyber incident
  12. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  13. How does the recent global IT outage affect me?
  14. King's speech introduces new bills in relation to cyber security, smart data and digital information
  15. What's a Cyber Incident and what should we do?
  16. Free short cyber training for staff
  17. Children's mental health data leaked after a cyber attack
  18. Cyber Incident Review: The Benefits
  19. Cyber attack on a University
  20. Kent Councils Data Breach
  21. Phishing attacks targeting schools - alert from City of London Police
  22. Update on Advisory for Rhysida Ransomware
  23. The Crime in a Cyber Attack and a Data Breach
  24. NCSC Annual Review is published for 2023
  25. Learning from Data Breaches
  26. Windows 11 security ineffective against attacks on old devices
  27. International Counter Ransomware Initiative 2023 Joint Statement
  28. Resistant Cloud Backups
  29. Top Ten Cyber Security Misconfigurations
  30. ICO Reprimand: company suffered a ransomware attack
  31. The UK Online Safety Bill becomes an Act (Law)
  32. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  33. Ransomware, extortion and the cyber crime ecosystem
  34. Cyber Resource: The Cyber Resilience Centre Group
  35. Email and Security: ICO recent guidance
  36. What to do in the event of a Cyber Attack
  37. Cyber Crime: AI Generated Phishing Attacks
  38. Cyber Attack: Exam Boards
  39. VICE SOCIETY - Ransomware attacks on schools
  40. Be Cyber Aware: USB Sticks
  41. Cyber Insurance in the Public Sector
  42. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  43. Cyber Attack: Manchester University
  44. Cyber Attack: Leytonstone School
  45. Be Cyber Aware: Firewalls
  46. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  47. Cyber Attack: Dorchester School
  48. Types of Cyber Attacks: Password Attacks
  49. Be Cyber Aware: Why regular software updates are important
  50. Cyber Attack: Wiltshire School
  51. Keeping your IT systems safe and secure
  52. Why we recommend using PIN codes on printers
  53. Types of Cyber Attacks: DDoS Attacks
  54. Types of Cyber Attacks: Phishing
  55. Types of Cyber Attacks: The Insider Threat
  56. Why your data is profitable to cyber criminals
  57. Types of malware and how they are linked to data protection
  58. A guide to multi-factor authentication
  59. How a school fought back after a cyberattack
  60. Types of Cyber Attacks - Credential Stuffing
  61. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  62. The Education sector now at highest risk of cyber attacks
  63. Cyber Attacks
  64. Emails – good practice and minimising the risk of a data breach

Search