Time is critical when responding to a ransomware attack. Being the first responder to an ongoing ransomware attack can be very stressful. Your first responders must know precisely what to do, so this post will walk through how to create a ransomware incident response plan. A ransomware incident playbook is one of many playbooks you … Read More “How to implement a lightning-fast ransomware playbook” »
Month: November 2022
The concept of Defence in Depth is quite simple. Add multiple different security controls to make a cyber-attack difficult. However, in reality, in most businesses, this is not something that happens at the service design stage. It is often implemented as an afterthought or a knee-jerk reaction to a security breach. So how do you … Read More “How to achieve defence in depth in your business” »
Phishing is one of the most commonly exploited external attack vectors, and the threat is showing no signs of going away anytime soon. 91% of UK companies surveyed experienced at least one successful email-based phishing attack last year; therefore, knowing what to do and when to do it as quickly as possible is paramount for your … Read More “How to implement a SecOps team phishing response plan” »
If you identify a security breach on your network, one of the first things you will want to do is remove the ability for the compromised account to sign in. Here is the correct way to block a sign in to an office 365 account. Steps to block sign in to an Office 365 account … Read More “How to block an Office 365 Sign-in correctly” »
Yesterday, Microsoft finally released their patches for the Exchange 0-day exploits that were made public back in September 2022, going by the names of CVE-2022-41040 and CVE-2022-41082. The full list of patched vulnerabilities patched are: The exploits forced IT teams across the globe to quickly mitigate the vulnerabilities, only to find that several iterations of … Read More “Microsoft finally patched serious Exchange 0-day over a month old!” »
If you’re here because you’re looking at how to set up a SecOps Incident Response Plan, then you have come to the right place. We’ll look at planning and implementing the process needed to form a SecOps team. To fail to plan is to plan to fail Can you honestly say, hand on heart, that … Read More “How to setup your first SecOps Incident Response Plan” »
On Tuesday, 25th of October 2022, OpenSSL announced an upcoming critical vulnerability in OpenSSL 3.0 that would be resolved in an update released on Tuesday, 1st of November 2022. OpenSSL v3.0.7 was released on Tuesday, 1st of November, which patched two high-severity vulnerabilities: CVE-2022-3602 and CVE-2022-3786. Scope The vulnerability only affects OpenSSL 3.0 – 3.0.6, so this vulnerability … Read More “OpenSSL version 3.0 releases 9.8 Critical Vulnerability – CVE-2022-3602” »
MFA has become the industry standard for all authentication where access to the network from external locations is required. It’s not uncommon to see articles online stating that “MFA prevents 99% of all credential attacks”. However, cybercriminals are always looking for ways to penetrate their target networks’ defences and MFA is no exception. If you’re … Read More “How to prevent and protect against an MFA Flood attack” »