Business continuity is all about asking ‘what if…?’ What if this fails? Or what if this becomes unavailable? What if we need a back-up plan? The theme for 2022 The Business Continuity Institute’s theme for this year is building resilience in the hybrid world. No one needs three guesses as to why this theme has […]
By Clare Stonebridge, Jisc network security services manager and Ben Crowther, Jisc defensive services manager, 31 March 2022. Distributed denial of service (DDoS) attacks are the malicious acts of cyber criminals attempting to disrupt computer and internet resources. These attacks have increased in size, frequency and duration over the past few years and continue to […]
Author: Jon Trickey, Information security officer Intro “Change your password regularly” is a frequently heard piece of password advice. However, enforcing password expiry can result in users making small, predictable changes to their existing password (for example, winter2021 > spring2022), rather than choosing an entirely new one. This has the opposite effect to the one […]
Author: Jon Hunt, Cyber security service delivery manager The National Cyber Security Centre (NCSC) describes the seriousness of the recently identified Log4j vulnerability very succinctly: “Last week, a vulnerability was found in Log4j, an open-source logging library commonly used by apps and services across the internet. If left unfixed, attackers can break into systems, steal […]
Author: Tracy Matthews, cyber security assessment manager, Jisc Expert support to gain cyber essentials certification Jisc’s Cyber Essentials service is a trusted way to obtain and renew your cyber essentials certificate. Cyber Essentials is a government-backed certification that will help your organisation provide protection against the most common cyber attacks. Give your stakeholders confidence in […]
By Hannah Marshall, Director of Information and Data Services at NCG On Thursday 30th September NCG implemented MFA on Microsoft 365 for all students, no exceptions. You might think why not a phased rollout? With over 40,000 student accounts in our Microsoft Tenancy across our seven colleges we simply couldn’t resource a phased rollout, and to […]
An initial access broker specialises in gaining access to target organisations before selling that access on underground marketplaces. Ransomware groups commonly purchase this access from them. Curated Intelligence have written a blog post showing how information flows between the different parties involved this work.
Ransomware steals headlines year on year. ‘The Uninvited’ malware can cause quite the fright, especially if it ‘Comes at Night’ and encrypts your data; restricting access to computers files and systems before requesting payment. No organisation or sector is immune. Since the first ever ransomware attack believed to be in 1989, it’s become one of the fastest growing malware, used to extort […]
Jisc launched its vulnerability disclosure policy in February 2019. The policy was drawn up using ISO 29147:2018, and using guidance from other organisations, most notably NCSC-NL. Here, we look back at some of the trends and successes, as well as the lessons we’ve learned and what we have planned in future. The policy encourages external […]
Author: David Batho, Head of Incident Response Formerly known as Janet CSIRT, exciting new changes are underway. The cyber landscape is changing, and so has our purpose as an incident response team. Ransomware and phishing attacks are significant threats to education. Therefore, we need to be proactive, partner with our members and provide accurate and […]