Tag: Cybersecurity

Photo taken from the top of Risshaku-ji temple, Yamadera, Yamagata, Japan. It shows temple buildings in the foreground, and a beautiful valley in the background.

A six-month review!

I’m looking back at my last post where I lamented it being two months between posts. This time, it’s been six months, hasn’t it? I hope you’ve all been well and 2024 has been kind to you so far.

Over the last six months, I’ve started between five and ten drafts of blog posts and never found the time or energy to finish them. I have some great ideas – analysis of a phishing email (I can’t figure out how best to structure it), slow productivity (hugely close to my heart at the moment), my personal 2023 reading review (when I’m terrible at putting critical review of media into words), and some others.

a screenshot of a phone

MFA and password managers

I’m going to mention some products and apps I use in this post. I am not affiliated with them and these should not be perceived as recommendations from my employer.

Let’s start with some definitions. MFA stands for multi-factor authentication, which you might also know as 2FA (two-factor authentication) or 2SV (two-step verification). You sign in to an online account using your username and password, and then you have to enter a code from a text message, call, or app, or you might approve a push notification in an app. You might also plug in a security key — I have a couple of Yubikeys.

At first it feels inconvenient to have that extra step, but it stops attackers or bots from getting into your accounts if they have your password, because chances are they don’t have your phone, biometric data, or security key. You’ve probably seen simulated phishing emails as part of your IT training that might be trying to trick you into typing your work account address and password into a website that will steal them. If you do unfortunately fall victim to this, MFA will protect you if someone tries to log in with your credentials. A commonly quoted statistic is that MFA will prevent about 99% of account breaches.

laptop computer on glass-top table

Your role in application security

What do you consider when you think of the applications you use at work?

mosque under blue sky

The Uzbekistan incident

On Thursday morning last week, a small subset of our users were told they couldn’t log in to Microsoft services even on their work computers. It turned out that two local Internet Service Providers (ISPs), Jurassic Fibre and Wessex Internet, had been interpreted by Microsoft as originating in Uzbekistan.

blue yellow red and green papers

Mystery “angus_dumps” folder

Probably an exceptionally boring subject for my first post, but I hope it helps some other IT people.

Powered by WordPress & Theme by Anders Norén