Cyber security is now a pressing issue for many organisations. If you’re unaccustomed to the technology sector, it can be hard to decode the extensive volume of technical language. As part of the research project I am currently involved, cyber security concerns within UK businesses is a key area. Read more as I attempt to break down the complicated language surrounding the topic in a Glossary of terms.
Posts
The National Cyber Security Centre recommend organisations use backups as a way to help mitigate against a wide range of potentially catastrophic problems, such as fire, theft, flooding, and – naturally – ransomware.
If you’re using Multi-Factor Authentication for your organisation, and want to use Apps that connect to your Office 365 account, you will need to create an Office 365 App Password. Thankfully, it’s really easy to do, if a little hard to find.
Azure Multi-Factor Authentication HowTo: In Part One and Part Two we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel and enrol users. In Part Three I will cover the additional steps the user is required to take in order to install and verify Multi-Factor Authentication with the Azure Multi-Factor Authenticator App.
Attackers behind today’s WannaCry ransomware outbreak in Europe are spreading the malware using the EternalBlue exploit leaked by the ShadowBrokers. Source: Malware Leaked NSA Exploit Spreading Ransomware Worldwide
Office 365 Multi-Factor Authentication HowTo: In Part One we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel. In Part Two I will cover the additional steps the user is required to take in order to enrol in Multi-Factor Authentication. The user will create two forms of verification and update their account recovery details.
It’s not at all a surprise that Google Mail users have today been hit by a massive Phishing attack. Given the rise of exploits being sourced using Google platform services, such as the GOOGLE RECAPTCHA BYPASS and the malware CARBANAK USING GOOGLE SERVICES it was inevitable.
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online. Source: Cloud Security Auto Lender Exposes Loan Data For Up To 1 Million Applicants
Exchange Online Multi-Factor Authentication HowTo: We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA), especially how you MUST enable it for sensitive accounts. I include all IT users, plus any senior management user within the organisation, such as the MD/CEO as their email is sensitive enough to justify Exchange Online Multi-Factor Authentication.
The malware is a dropper discovered by Kaspersky Lab as Reconyc. The dropper is a cybercrime tool used to install other malware on infected computers. IBM said the drives that were infected have a part number 01AC585; Storwize systems with serial numbers beginning with 78D2 aren’t compromised.
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.