Smartphones, ransomware and Microsoft Office macros are featured in this week’s cyber security news. The post covering cyber security and the Ukraine Russia conflict has be updated several times this week – make sure you are aware of the latest developments and have actioned the National Cyber Security Centre’s advice, linked to in the post.
The Microsoft flip-flop story of “to block or not to block” Office macros has (hopefully) been resolved this week – with the “blocking VBA macros in files from the internet” being the default. (I have written an article for the cyber security training website CyberAwake, looking at the good, the bad and the ugly around the issue of macros – it is due to be published next week, and there will be a link in next week’s round-up.)
Smartphones have always been a target for threat actors, highly capable, internet connected computers, constantly in the hands of many people who do not truly understand security or privacy – loaded with all of their personal and private information! In the past few weeks there appears to have been a rush of malicious apps discovered in the Google Play Store and iPhone users are not exempt, there is Pegasus and Hermit spyware for high value targets and text message phishing campaigns for the rest of us.
Ransomware stories this week cover, free ransomware software available for less skilled threat actors, the malware author just wants 20% of any ransoms collected to ransoms being returned by law enforcement agencies. You need a cyber security plan to avoid being a ransomware story. To go with that cybersecurity plan you need an incident response plan – I know that next week’s staff training at Octagon, is being run by Martin, our operation’s manager and he is going to be running through an aspect of our incident response plan, to check we are prepared. That is the type of incident response plan you need.
The “Because IT’s Friday” post this week is back in space.
This is a weekly round-up of the articles from Smart Thinking Solutions, our specialist cybersecurity, governance and compliance web site.
The articles are mostly quick reads to give you an overview of the cybersecurity threat landscape facing businesses today, with links to the sources. Many of the posts have action points or top tips to help you navigate these threats to your organisations.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie
Duration
Description
CONSENT
2 years
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
_ga
2 years
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_141969298_1
1 minute
Set by Google to distinguish users.
_gid
1 day
Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Cookie
Duration
Description
fr
3 months
Facebook sets this cookie to show relevant advertisements to users by tracking user behaviour across the web, on sites that have Facebook pixel or Facebook social plugin.
VISITOR_INFO1_LIVE
5 months 27 days
A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSC
session
YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devices
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-id
never
YouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
_fbp
3 months
This cookie is set by Facebook to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising, after visiting the website.