A book for the public - to all the non IT folks out there. Have a good read! If you are using social media on a daily basis, this is a good read for you. The signs to watch out for! Spend few mins - its free! Buy Now
Choosing a good password
Key to a safe life is a strong password
Microsoft Defender — Detect Hidden Windows Runs
A Usecase Series — Threat Hunting
Azure Sentinel — Simultaneous Logins on a Host
A UseCase Series
Two factor Authentication – which type?
Which two-step authentication has better security, a text message or an authenticator app?Answer: Both has its pros & cons. SMS: * Its convenient * Doesn't require a smartphone * Doesn't need any setup * Last of all, its a good "teller" when some one is trying to break in to your account. However, it can … Continue reading Two factor Authentication – which type?
Common cyber security threat
What is the biggest cyber security threat to your business?Answer: There are many, however my thought always goes to "Phishing" Offenders are never going to stop finding any loophole that they would want to exploit. Because to them, every small piece of information they could find is a treasure in hand. No matter how many … Continue reading Common cyber security threat
Incognito Mode — The reality
Its not exactly the stealth mode
Turn off Auto-play
Basics to staying safe
Are You Giving Away Your Personal Information?
What your phone knows about you?
Email Security – These are the signs you should be looking for
Originally published at: https://www.todayslegalcyberrisk.co.uk/guest-writers/email-security-these-are-the-signs-you-should-be-looking-for/ Folks working in IT might be aware of how to spot the red flags on a spam/phishing emails and the ones who don't not so much. The lack of knowledge about cyber security is the reason why many of us are prone to cyber-attacks. To survive in this fast technology-pacing world, … Continue reading Email Security – These are the signs you should be looking for