Posts about cybersecurity

How do Websites Use My Data (Best Practices for Data Sharing)

Websites store and use user data in many ways, usually to personalise content, show ads, and make[…]

Guide to Strong Passwords and Authentication

Cyber risks are smarter than ever in today’s digital world. People and companies can lose money, have[…]

All About the New U.S. IoT Cyber Trust Mark

The Cyber Trust Mark is a new smart device label created by the US government to prove that[…]

Cyber Security

M6: Inadequate Privacy Controls

This is a new one, in this specific form, and refers to vulnerabilities where an app does[…]

Cyber Security

M5: Insecure Communication

This one has dropped from number three since the 2016 list. Threat Agents Application Specific Virtually all[…]

Guide to Secure File Storage and Transfer

File storage and transferring hold a very dear place in most people’s lives. However, the safety of[…]

Russia Aligned Threat Actors Breach Secure Messaging Apps

We’ve just learned today that officials within the Trump administration inadvertently shared Yemen strike plans with journalist[…]

Secure Conveyancer

Cybersecurity – 6 Sectors at Risk

Let’s take a look at some specific sectors and assess their risk of cyberattack. If your industry[…]

Cyber Security

M4: Insufficient Input/Output Validation

This is a new one (in this form) for the updated list, although in the 2014 list[…]

Top Business Risks for 2025

The recent report, Allianz Risk Barometer: Identifying the major business risks for 2025 analyses responses from over[…]