propaganda

Leveraging propaganda as Social Engineering

Mark Honeycutt Compliance, Governance, Investigation, Management, Network, Risk, Security, Strategy 10 Comments

Editorial preface The below article was written by Mark Honeycutt, and is the first in a series of what already promises to be an excellent read. Mark is the owner of Shark Cybersecurity and is a Social Engineering expert who specialises in Social Engineering penetration testing engagements which are followed up with employee training.  He has a Master’s Degree in …

identity

How a cyber criminal can steal your identity

Mark Cutting Analysis, Investigation, Ransomware, Security, Strategy 4 Comments

This article is number three in a series of three that I’ve been asked to write by one of my followers. The first article in the series can be found here, and the second, here. As always, feel free to ask me any questions ! Given the recent announcement in the news around the 711 million email addresses and passwords …

hacker

Think you can spot a hacker ? Think again.

Mark Cutting Analysis, Investigation, Network, Patching, Risk, Security 3 Comments

Preface Before we proceed on this article, let’s set the record straight. I’m potentially throwing myself to the lions here, but here goes….. After posting a previous version of this article on Peerlyst (in it’s original format) last September, the “local hood” got somewhat upset at my portrayal of the word “hacker” – see here. This caused upset with some …

cloud

Moving to the cloud ? Be sure you’re compliant

Mark Cutting Analysis, Cloud, Compliance, Governance, Management, Security, Strategy 2 Comments

Businesses small, medium and large have all at some point considered the possibility and eligibility of moving to either a hybrid or full Cloud model. Adopting this approach has obvious business benefits – not only around cost, but also the greater flexibility in terms of data and application and information accessibility. A cloud business strategy and model allows you to …

Lock it or lose it – harden your WordPress installation

Mark Cutting Management, Network, Security, Strategy 14 Comments

In order to effectively reduce costs, several businesses are moving away from complex designs and bespoke hosting to a simpler platform based on WordPress – often self-hosted. According to WordPress, “Code Is Poetry”, and literally anyone with a basic knowledge can create a website within a short space of time. With a potentially massive reduction in cost, who can blame …

bigdata

Can big data reliably predict a cyber attack ?

Mark Cutting Analysis, Governance, Management, Security 4 Comments

After the fallout of the WannaCry attack that infected and effectively disabled machines located in 150 countries around the world, one question rises to the surface of every security think tank. ……..Is it possible or practical to utilise big data and machine learning to accurately predict the next cyber attack ? Given the extent of available intelligence and information around previous …

flamethrower

Sweating assets is ok – but not with a flamethrower

Mark Cutting Inventory, Management, Network, Security, Strategy 3 Comments

If there’s one thing that exposes devices and other assets significantly to increased vulnerability, it’s stretching their lifetime way beyond that was originally intended in their original development and subsequent release. Like humans, these assets are not designed to go on forever – similarly, gone are the days when you could buy a domestic appliance, and have it last 20 years. The manufacture process …

assets

Understanding the risk of legacy assets on your network

Mark Cutting Budgets, Management, Planning, Strategy 6 Comments

If there’s one thing that exposes devices and other assets significantly to increased vulnerability, it’s stretching their lifetime way beyond that was originally intended in their original development and subsequent release. Like humans, these assets are not designed to go on forever – similarly, gone are the days when you could buy a domestic appliance, and have it last 20 years. The manufacture process …

security

How to use a history paradigm to explain security

Mark Cutting Governance, Management, Planning, Security, Strategy 4 Comments

For centuries, security has always had a part to play in protecting our well being and associated environments. But how could we best explain it’s benefits and make technology digestible using history ? One of the important key skills any IT Manager needs to master is the ability to explain technology to senior management. In this article, I’ll try (hopefully not …

network

The foundation that creates a stable and secure network

Mark Cutting Management, Network, Planning, Security 3 Comments

At the heart of today’s communications is the network. Ranging from simplistic to complex, each of these frameworks plays a pivotal role in joining disparate nodes together. But what happens when a design or security flaw impacts the speed, functionality, and overall security of your network ? What factors create a network ? A network is a collection of components …

strategy

Strategy and security – the essential balance often overlooked

Mark Cutting Security, Strategy 4 Comments

Strategy planning is an essential process in order to determine when to propose and implement new technology so that it aligns with the business requirement and user needs. New technology appears on a daily basis, and with applications designed to tame the most mundane tasks and simplify them, part of the strategy proposition typically includes a means of streamlining and improving …