Posts by Chris Smith
Is Compliance Enough for a Good Cyber Security Posture?
In today’s digital age, cyber security has become a critical concern for individuals, organisations, and governments alike. Cyber-attacks can lead to significant financial losses, reputation damage, and even national security threats. As a result, compliance with cyber security regulations has become a top priority for many organisations. However, compliance does not necessarily bring about cyber…
Read MoreInsider Threat – The Danger Within!
Jack Teixeira an IT specialist with the US Air Force has been arrested and accused of an intelligence leak believed to have started on Discord. He shared confidential papers on the social media platform including details regarding British Special Forces in Ukraine. This comes 10 years after the most notable leaks by Edward Snowden, a…
Read MoreRisky Business: A Guide to Information Security Risk Assessment
Risk assessment is an important process in information security that involves identifying potential risks and evaluating the likelihood and impact of those risks. The process involves identifying assets, evaluating threats, assessing vulnerabilities, and determining the potential impact of a successful attack. There are two main types of risk assessments: qualitative and quantitative. Qualitative risk assessments…
Read MorePasswords: The Gatekeepers of Your Digital Life
In the digital age, passwords are the keys to our online kingdoms. From email accounts to bank statements, social media profiles to streaming services, our lives are increasingly locked away behind these often-neglected digital gates. But what happens when these gates are weak, flimsy, or worse, left wide open? The Grim Reality of Weak Passwords…
Read More