Service Offerings
- Cyber security training
- Product reviews
- Blog or article writing
- Cyber security consulting for SME & HNWI
Chapter Author
Contact Graeme
Journalists, students, potential clients or anyone else, email.......
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
No AI Used Here
Not all forms of multi or two factor authentication are “bulletproof”
- Details
- Category: Cyber Security (Personal)
After people figured out passwords were not sufficient for securing remote connectivity, RSA was widely used and got very big & rich. The problem with RSA tokens is that people can or do leave them in the laptop bag and possibly with a Post-it note next to them with a password on. RSA codes change every x seconds so it is a little hard to use a code from 5 seconds ago since when you come to use it, it has changed. If you found or stole a laptop with the RSA token then it is a different story since you have you have the laptop and token, and then you just need the username & password which could be in the bag. Yes, this does happen!
WhatsApp privacy & security and the terrorist attack on Westminster
- Details
- Category: Cyber Security (Personal)
Facebook who themselves do not have the best of privacy reputation now own WhatsApp which means it needs to make money somehow. Security was an afterthought like with many other companies. End to end encryption was only released a year ago and it is automatically transparent to users. What does this mean? The user does not have to switch it on, enter a password or generate an encryption key (and exchange). Nice this may sound but it reduces privacy since everything is handled non-transparently behind the scenes by WhatsApp.
Email borne malware: if the majority of burglars came through your front door, wouldn’t you focus protection on that entry method?
- Details
- Category: Cyber Security (Personal)
The virtual world is no different, attacks are not as advanced as you imagine and with anything, people go for the easiest route in. Look at well known attacks dating back six years or so; RSA, Target Corporation, Sony Entertainment and the Ukrainian power grid, they all have something in common, most sources say the breach started off with a seemingly innocent email with a malicious attachment.
Page 24 of 60
