Amanda-Jane Turner's Blog

November 14, 2021

What is #cybercrime?

When cybercrime s mentoned people may immediately think of malware, others may think phishing, however cybercrime is far more than that. Cybercrime is crime against technology or crime enabled by it. This means that as well as perhaps the more obvious crimes of malware and phishing, it encompasses online fraud, unauthorised modification or destruction of data, romance fraud, tech support or remote access scams,  child abuse material, and a range of other crimes.

Remember that anyone can become a ...

 •  0 comments  •  flag
Share on Twitter
Published on November 14, 2021 02:05

October 21, 2021

#cybersecurity - 5 points about vulnerabilities and patching

Software and technology evolve fast, and at times they may have an inadvertent flaw in them. Vulnerabilities in technology or software code can be exploited by criminals to gain access to a person’s computer or phone, or a company’s system. The reason why software companies release security patches is to fix or mitigate security flaws that have been discovered in their code

 

Five points about vulnerabilities and patching:

1. Vulnerabilities – A flaw in code, hardware or systems may be exploited ...

 •  0 comments  •  flag
Share on Twitter
Published on October 21, 2021 17:10

October 12, 2021

Guest Post - Ella Donald - How do I spot a #phishing scam? #cybersecurity

Thank you to my lovely colleague, Ella Donald, for generously taking time to write this article supporting the demystifying cyber project and helping people to stay safer from cybercrime.

How do I spot a phishing scam?As society becomes more digitised, our lives are increasingly conducted online. We must give our banking details, identifying information, and more to many sources, and may be prompted to provide them again. Our email inboxes are, more than ever, a receptacle of sensitive informatio...
 •  0 comments  •  flag
Share on Twitter
Published on October 12, 2021 22:39

October 3, 2021

Guest Post - Simon Stahn - So, you want a new IOT device in your home ... #cybersecurity #IoT

Thank you to the well-respected data governance and information security expert, Simon Stahn, founder of  consultancy and advisory company, Adrenalan, for writing this article and supporting the demystifying of all things cyber. If you are deciding whether or not to get your home interconnected, or already have IoT in your home, this is the article for you to read.
\So, you want a new IOT device in your home… how do you go about evaluating its risks to you and your environment?

Let’s reduce this t...

 •  0 comments  •  flag
Share on Twitter
Published on October 03, 2021 02:11

September 20, 2021

#Cybersecurity - least privilege

The concept of least privilege relates to users having an account on a computer / system that has the absolute minimum permissions needed to do their work.

If a criminal manages to access a computer or system via administrative privileges they can hide their tracks, exfiltrate data, and ensure they remain undetected for a long period of time. If however a criminal gains access to the computer system credentials of a person with limited access, then the criminal is restricted on what they can do....
 •  0 comments  •  flag
Share on Twitter
Published on September 20, 2021 00:06

August 19, 2021

Guest Post - Craig Ford. - The road less travelled

 Thank you to author and infosec profesional Craig Ford, for writing this article and supporting the demystifying of all things cyber. If you are looking for your dream career in cybersecurity, infosec, all things cyber, this article will be of interest to you.

If you use Goodreads, please follow Craig's author page on Goodreads.

                                                        ......... 

The road less travelled

What is the right path for you to get into cybersecurity? 
Honestly, I have absolu...
 •  0 comments  •  flag
Share on Twitter
Published on August 19, 2021 03:04

July 26, 2021

Guest Post - Rajitha U. - Responsible Disclosure

Thank you to the highly respected infosec professional, Raj, for writing this article on responsible disclosure of exploitable vulnerabilities. This artilce highlights the reasons for being carefull how vulnerabilites are disclosed, adn the ethical approach to this disclosure.

                                                        ......... 

A few days ago, I saw one of the cybersecurity enthusiasts publish a post on how he found a brand-new vulnerability affecting a network security device. No d...

 •  0 comments  •  flag
Share on Twitter
Published on July 26, 2021 02:15

July 9, 2021

#cybersecurityFAQ - Does HTTPS mean the site is safe?

The Cybersecurity FAQ series, in the Demystify Cyber project's blog, looks at some commonly asked questions about cybersecurity and cybercrime. If you have a query you would like covered in a future blog post please contact Demystify Cyber via the contact form.

________________________________________


QUESTION: If the website has HTTPS does that mean it is safe?

ANSWER: HTTPS means the web traffic is encyrpted for data transmission security but does not mean the website is safe.

The Hypertext Transf...

 •  0 comments  •  flag
Share on Twitter
Published on July 09, 2021 12:00

July 5, 2021

10 cybersecurity essentials for individuals

If you use connected or connectable technology in any form it is essential you do what is in your power to help protect your information, finances and accounts. Although cyber security can seem daunting, it is just another avaneue of life we need to learn to be secure in. From a young age you may have learned about keys and locking doors, or looking both ways before crossing a street, let's make cybersecurity as easy to understand! 

Here is a list of some achievable basic cybersecurity essentials...

 •  0 comments  •  flag
Share on Twitter
Published on July 05, 2021 20:38

June 24, 2021

Guest post - James Meikle - BBQing #Risks Steakments (Statements)

 Thank you to James Meikle for contributing his expertise to support the Demystify Cyber project. 

........................

BBQing Risks SteakmentsStatements

 

Risk statements have the power to deliver a strong message to people from all backgrounds on something bad that might happen. To be clearly understood common language should be used. There are a few different ways to formulate risk statements this is just one of the common ones.

PS: We all need an acronym swear jar!

 

As I would like to see ...

 •  0 comments  •  flag
Share on Twitter
Published on June 24, 2021 07:00