Grant McGregor Blog
Posts about

two-factor authentication

What is Zero Trust and Should I Be Implementing It?

What is Zero Trust and Should I Be Implementing It?

The IT world is full of acronyms and strange phrases. “Zero Trust” is one of the latest to be bandied about, but what does it mean? And is it something your organisation needs to be thinking about? Zero Trust is a model for IT security. Although it is not a new concept, there is an increasing...

Read More

How to ensure web applications used in your business are secure

How to ensure web applications used in your business are secure

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

Read More

Phishing in the time of coronavirus

Phishing in the time of coronavirus

Grant McGregor has written extensively on this blog about the growing risk from phishing, spear phishing and social engineering. Now, experts warn these risks have got an extra boost from the coronavirus pandemic. In April 2020, the UK’s National Cyber Security Centre (NCSC) launched a campaign to...

Read More

Why You Should be Using 2 Factor Authentication Right Now!

Why You Should be Using 2 Factor Authentication Right Now!

According to the Verizon 2019 Data Breach Investigations Report, 62% of breaches not involving an Error, Misuse, or Physical action (in other words, wounds that weren’t self-inflicted) involved the use of stolen credentials, brute force, or phishing.

Read More

On the Blacklist

On the Blacklist

The National Cyber Security Centre says maintaining a password blacklist is an essential part of good password security. We take a look at what should be on your blacklist and how to go about enforcing it.

Read More

The New Rules for Passwords in 2019

The New Rules for Passwords in 2019

Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

Read More

Going to The Darkside?

Going to The Darkside?

The internet has become an integral part of most people’s lives to the point that it’s hard to imagine a time when it didn’t exist - assuming you’re old enough to remember that it really hasn’t been around forever.

Read More

One Year On from GDPR: What’s Changed?

One Year On from GDPR: What’s Changed?

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. At the time it was heralded as a major change in the way individuals and organisations will think about – and collect, manage and secure – data.

Read More

Doubling up: why two-factor authentication is your next step in digital security

Doubling up: why two-factor authentication is your next step in digital security

We’ve written about the need for additional layers of security for passwords, especially given the increased targeting of Microsoft’s Office 365 as more and more businesses and individuals migrate to the cloud, especially for email.

Read More

Are Your Websites and Applications Secure?

Are Your Websites and Applications Secure?

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

Read More

    Categories

    see all