InfoSec / Cyber

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 4: When a Cyber Attack Hits

Even with the robust preventative measures, cyber attacks can happen.  The key is is not to panic and to have a plan, most organisations will call this a cyber incident response plan.  Knowing what to do in the immediate aftermath can significantly mitigate the damage, limit data loss and speed up recovery.

Read more …

 A stylized image of a panda wearing a dark suit and tie, standing in a bamboo forest. The background is a mix of digital circuit patterns and glowing lights. At the bottom, a graphic overlay with the text, "IS THERE A 'MURKY PANDA' ON THE TIMETABLE? THE LATEST CYBER THREAT." The logo for "D NEWS" is in the bottom right corner.

The Latest Cyber Threat: The "Murky Panda"

The Murky Panda (also known as Silk Typhoon) is a cyber threat that has had significant activity since 2023 and has targeted government, technology, academic, legal and professional services. Currently there are reports of the threats only in North America, however, as the Murky Panda has previously targeted compromises in the cloud, it is assumed that they will easily transition to attacks further afield. The threat group is a China-nexus group

Read more …

  1. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  2. World Password Day
  3. Apple removes its highest level data security tool from UK customers
  4. The role of Passkeys in Cyber Resilience and Cyber Security
  5. Ransomware-Resistant Backups
  6. Effectively communicating during a cyber incident
  7. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  8. How does the recent global IT outage affect me?
  9. King's speech introduces new bills in relation to cyber security, smart data and digital information
  10. What's a Cyber Incident and what should we do?
  11. Free short cyber training for staff
  12. Children's mental health data leaked after a cyber attack
  13. Cyber Incident Review: The Benefits
  14. Cyber attack on a University
  15. Kent Councils Data Breach
  16. Phishing attacks targeting schools - alert from City of London Police
  17. Update on Advisory for Rhysida Ransomware
  18. The Crime in a Cyber Attack and a Data Breach
  19. NCSC Annual Review is published for 2023
  20. Learning from Data Breaches
  21. Windows 11 security ineffective against attacks on old devices
  22. International Counter Ransomware Initiative 2023 Joint Statement
  23. Resistant Cloud Backups
  24. Top Ten Cyber Security Misconfigurations
  25. ICO Reprimand: company suffered a ransomware attack
  26. The UK Online Safety Bill becomes an Act (Law)
  27. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  28. Ransomware, extortion and the cyber crime ecosystem
  29. Cyber Resource: The Cyber Resilience Centre Group
  30. Email and Security: ICO recent guidance
  31. What to do in the event of a Cyber Attack
  32. Cyber Crime: AI Generated Phishing Attacks
  33. Cyber Attack: Exam Boards
  34. VICE SOCIETY - Ransomware attacks on schools
  35. Be Cyber Aware: USB Sticks
  36. Cyber Insurance in the Public Sector
  37. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  38. Cyber Attack: Leytonstone School
  39. Be Cyber Aware: Firewalls
  40. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  41. Cyber Attack: Dorchester School
  42. Types of Cyber Attacks: Password Attacks
  43. Be Cyber Aware: Why regular software updates are important
  44. Cyber Attack: Wiltshire School
  45. Keeping your IT systems safe and secure
  46. Why we recommend using PIN codes on printers
  47. Types of Cyber Attacks: DDoS Attacks
  48. Types of Cyber Attacks: Phishing
  49. Types of Cyber Attacks: The Insider Threat
  50. Why your data is profitable to cyber criminals
  51. Types of malware and how they are linked to data protection
  52. A guide to multi-factor authentication
  53. How a school fought back after a cyberattack
  54. Types of Cyber Attacks - Credential Stuffing
  55. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  56. The Education sector now at highest risk of cyber attacks
  57. Cyber Attacks
  58. Emails – good practice and minimising the risk of a data breach

Search