Search the blog:
With the lines blurring between our digital lives at home and at work and many devices being used for work and personal use, the need to educate staff about seasonal cyber-security dangers has never been more important. With Black Friday and Cyber Monday sales bombarding our inboxes recently (and...
Last month, the joint heads of MI5 and FBI came together to issue a joint warning to businesses in the UK, the USA and Europe about the risks presented to business by Chinese state. Grant McGregor takes a look at the scope of those warnings and discusses what it means for businesses like yours and...
It’s a while since the Grant McGregor team shared information about password best practice – and a lot has changed. Not least in terms of the new guidance in the UK Government’s Cyber Essentials scheme, but also in terms of the technology solutions now available to strengthen security. Earlier this...
Hackers have been active on both sides in the conflict between Russian and Ukraine. The Grant McGregor team asks: should you be worried? Could your IT systems be caught in the crossfire in the cyberwar? And how can you protect your IT systems? We’ve all been shocked by the terrible events unfolding...
Last week there were stories that a password manager called LastPass had seen some of its customers’ master passwords compromised. The company denies that happened. And it’s possible that some of the people who reported being affected had old accounts with master passwords they’d used with other...
The National Cyber Security Centre says maintaining a password blacklist is an essential part of good password security. We take a look at what should be on your blacklist and how to go about enforcing it.
Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?
For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.
We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?