Stuart Wilkes

Featured

The post WannaCry and Petya world is a money making opportunity for some. After last week’s Petya ransomware outbreak, coming only a few weeks after the WannaCry outbreak a predictable series of events unfolded. Not the technologists urging companies to take preventative actions against such attacks, not the security specialists deconstructing the attack, its origins and its motivations, and its […]

Featured

It’s a commodity that appears to be in increasingly short supply. It’s a shame that it isn’t taught in schools. So many seem to lack even the most basic form of it What am I talking about? That strangely intangible concept of ‘Common Sense’ CNET this week explained how there was a woeful lack of common sense in the realms […]

Featured

How long will it take to get into a habit of using basic cyber hygiene techniques? When you come out of a training course, be that one on cyber security from the NCSC, or one that will assist with your continued professional development you always make a little deal with yourself that without fail you will put in practise, starting […]

Featured

The debate into leaving backdoors in all forms of digital communications took another twist this week, surprisingly in favour of the individual. As reported by the BBC the European Parliament committee is proposing that end-to-end encryption be enforced. This would be used to protect sensitive personal data from hacking and government surveillance. This of course goes against some of the […]

Featured

Where do you stand on the using private social media accounts as part of an ‘extreme vetting’ policy? The summer is on its way. Before long you will be packing your bags, grabbing your passport and heading off to fun packed family adventures. But how would you feel if when going through passport control, you were stopped and refused entry […]

Let’s start with a little IT history lesson. Why is a software patch called a patch? It’s because way back in the midst of time when data, or instructions, were stored on punched cards, if an error was found – meaning that there was a hole punched in the card in the wrong place – then it would be covered […]

There is no doubt about it, to many people cyber security is a challenge. There are many aspects to consider and as you do consider them a few more will reveal themselves. Of these potential cyber security challenges, which are the top ones being faced by businesses today? According to a senior threat researcher from IBM, who answered this question […]

Featured

Is the question “Why is cyber security so damn hard?” the right one to be asking? “Why is cyber security so damn hard?” lamented an SME owner to me a couple of weeks ago. “It just seems that it is unrelenting, unpredictable and highly distracting” he added. Now I’m not one for immediately responding with insight and words of calm […]

I need to make a small confession to you, please don’t judge me. At one point in my life I used my programming skills to deface a publicly facing computer, a simple but effective case of what by todays standards could be classed as a cyber crime. I humbly ask for your forgiveness. In my defence I was only about […]

Featured

From Shakespeare to House of Commons Committee of Public Accounts, those in power have often had issues with breaches; data or otherwise. Now I don’t want to sound all a bit cultured here, as this blog is all about cyber security, but I’m going to talk a little bit about Shakespeare. Now please don’t be put off, but my very […]