A Hitch-Hacker’s Guide to the Galaxy: Episode 4

A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I am looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there for […]

A Hitch-Hacker’s Guide to the Galaxy: Episode 3

A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I am looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there for […]

Categories
Uncategorized

MFA for Cyber Essentials

Cyber Essentials and Multi-factor Authentication (MFA)   What is MFA? Multi-factor authentication (MFA) is an authentication process that necessitates users to provide evidence of their identity through the submission of multiple verification methods, commonly known as “factors.” This approach ensures both the user’s identity and the legitimacy of their credential access. Two-factor authentication (2FA) is […]

A Hitch-Hacker’s Guide to the Galaxy: Episodes

A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders Episode List Episode 1: It’s Dark Out There.  The threat landscape. Episode 2: Know Thyself.  Hardware, software and information asset management. Episode 3: Knock, knock, who’s there? The problem with passwords. Episode 4: Who goes there? Friend or foe? Applying […]

A Hitch-Hacker’s Guide to the Galaxy: Episode 2

A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I am looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there for […]

A Hitch-Hacker’s Guide to the Galaxy: Episode 1

A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I will be looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there […]

How can universities and colleges keep critical services running smoothly during clearing and enrolment?

There’s never a ‘good’ time to suffer a cyber attack, but there are certainly a few dates in the year when the financial and reputational effects of a website or email failure will be more damaging than others. One of those key periods is approaching right now for the higher and further education sector: clearing and […]

How to handle cyber security incident communications

UCISA has launched an excellent new resource to help institutions plan the communication response during a major cyber incident. The Cyber Incident Communications Toolkit, developed by the UCISA Security Group focuses on the importance of collaboration both internally and with partners to ensure provision of an effective and coordinated communications response with students, staff, funders, […]

New Cyber Essentials requirements and question set

Another year, another question set and new updates on Cyber Essentials (CE). Effective from 24th April, 2023, the new question set is called Montpellier, which sees only clarifications, with a light touch of the question set, unlike the major changes that were introduced last year for the current Evendine question set. With the new question […]

Cyber Essentials Myth Busting – Part 2

Author: Stuart McCulloch, Lead Cyber Essentials assessor Continuing on from the previous blog the other myths surrounding CE are: Myth 5 – If I use Remote Desktop Services or VDI environments, then the devices connecting to those services are out of scope  Reality – This is not true. The devices themselves that facilitate the connection to […]