Monthly Archives: March 2016

You only hear what you want to

If you were listening to popular music in the mid-90s, you doubtless remember “Stay” by Lisa Loeb. I don’t know if the person who told her that she “only hears what she wants to” was a cognitive psychologist, but there was certainly truth in that remark – not just for Lisa, but for all of us.

Continue Reading


Application authentication needs a reboot

Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting  (yes, it is possible to do whitelisting today – we do it with lots of our clients as do other providers).

Continue Reading


Lockdown Locky

Locky is the latest in an ever increasing range of ransomware threats used by cyber criminals in an expanding and increasingly  lucrative market. . What makes Locky special is that it appears to have come from the same group behind several large Dridex campaigns showing that they are possibly diversifying their range of attacks.

Continue Reading


Who administrates the admins?

The challenge of finding the right balance between giving too many admin rights vs. too little admin rights is often talked about from the end user perspective, however the same challenge applies to those managing the IT department itself and this is a part of the journey that is often overlooked.

Continue Reading