WARNING. North Sea firms likely already attacked
Mike Jones, a former hacker, joined us for a fireside chat at Robert Gordon University to share his story and insights about Cyber Security.
The 4 main points to takeaway are:
1. A hacker is always going to find a way in.
2. A lot of networks are compromised because of employees clicking on bad emails or using compromised USB sticks.
3. The faster you stay on top of technology and educate people about the vulnerabilities the longer you can put of the inevitable.
4. Unless you educate your staff about security and how their behaviours affect the company, you'll be wasting your time doing anything else.
Read the full Press and Journal article here
Mike will be returning for more events in 2019.
Follow us on social media to make sure you don't miss our latest updates.
- What is Phishing and what can you do to prevent it?
- Found malware, now what do you do?
- Data breaches and other scary 2019 events- Special Halloween post
- How to get your cyber security budget approved by the board
- The TechForce Sponsorships
- How to start a career in the security industry
- Protecting your business in the cyber security era
- Secure Your Supply Chain
- Case study: British Airways Fined £183.4million for Data Breach
- The Silver Bullet in Cyber Security
- Fake invoice email scams and Office 365
- How to apply for the Cyber Essentials Voucher Scheme
- What is Business Email Compromise (BEC) and how to stop it
- Everything you need to know about Cyber Essentials
- Cyber Essentials Demystified
- How to choose a Security Awareness Platform
- 6 Quick and Easy Email Security Tips for Dummies
- Hackers On Tour
- How to share passwords safely in your Small Business
- 10 Steps to Cyber Security
- 6 Top Tips to Prevent Cyber Attacks
- Start-up a force to be reckoned with.
What is Phishing and what can you do to prevent it?
Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive informationMore
Found malware, now what do you do?
You’ve found some malware on your computer, so what should you do next? What’s the best approach? We’ll run through a few things that will greatly assist in identifying and isolating the malwareMore
Data breaches and other scary 2019 events- Special Halloween post
It’s that time of the year again, where the ghosts come out of the cupboard and the witches cackle. These are the scariest parts of cyber security from 2019 and the scale of how scary they actually are.More
How to get your cyber security budget approved by the board
There’s a few ways to improve the approach to the company board that will significantly help to get them onboard with improving cyber security, especially when linking this to risk mitigation.More
FOR LATEST UPDATES SUBSCRIBE HERE: