Teaching Cyber Blog

Month: June 2023

  • Protecting your Finance department from cyber security attacks

    Protecting your Finance department from cyber security attacks

    Finance departments are often overlooked within organisations as they are seen as established mature areas of the business.  The reality is that they are prime targets of financial gain from hackers and cyber criminals.  How to improve the security and defend from threats? Firstly, use strong access controls, authentication and authorization processes to control access…

  • How to move from Governance, Risk and Compliance team into Cloud Security?

    How to move from Governance, Risk and Compliance team into Cloud Security?

    It may seem like a big change, however many of the skills learned within Governance, Risk and Compliance will come in useful.  Yes there will be a new learning curve, but no more difficult from the learning curve is takes to land that first role in cyber security. Speak to colleagues who work in Cloud…

  • Intellectual Property Cybersecurity Checklist for SME and Enterprises

    Intellectual Property Cybersecurity Checklist for SME and Enterprises

    Protecting intellectual property doesn’t have to start with an expensive cyber security solution.  Thorough preparation and organisation of your data can provide some security and ongoing cost benefits when security expenditure is eventually required. 1. Identify and classify intellectual property, build an asset list. 2. Implement access controls based on job roles and responsibilities. 3.…

  • Using DevSecOps for Artificial Intelligence (AI) Solution Security Development

    Using DevSecOps for Artificial Intelligence (AI) Solution Security Development

    Welcome, in this article I discuss merging the rules of DevSecOps to help build more secure  artificial intelligence solutions of the future. DevSecOps, which combines development, security, and operations, can play a significant role in enhancing AI solution security. DevSecOps practices can be applied to help improve AI solution security overall. Use Secure AI Model…

  • Protecting your Human Resources (HR) department from cyber security attacks

    Protecting your Human Resources (HR) department from cyber security attacks

    A quick guide to protecting your human resource departments from cyber security attacks.  HR is a target for sensitive employee data.  Maintaining the confidentiality, integrity, and availability of HR solutions, process and people is important and challenging. Employee data is central, protect employee personal data, including personal identifiers such as social security numbers, addresses, and…

  • Top three methods to improve security culture

    Top three methods to improve security culture

    Improving security culture within an organisation is necessary to secure the human and to promote both personal and collective responsibility for security. These are the three most important areas where security culture can be improved from. 1. Employee Education and Awareness, using a combination of creating comprehensive security training for all employees, conduct targeted phishing…

  • Three step plan to protect containers

    Three step plan to protect containers

    Welcome and thank you for reading this article!  Protecting containers is essential to the security of a container-based application, data and associated services integrated with it. Where to start? This three step plan will help mitigate against the majority of threats, with the understanding container security is continuous with no real end stage. 1. Follow…

  • Cyber security laws and regulations for Western serving markets

    Cyber security laws and regulations for Western serving markets

    Cybersecurity laws and regulations vary across countries and the number is growing as nations cybersecurity mature.  The laws in this article are more specific to western and western serving markets and should always be considered, particularly with respect to an form of security assessment, process or compliance. General Data Protection Regulation (GDPR), applies to European…

  • Want to implement threat intelligence? Follow these steps

    Want to implement threat intelligence? Follow these steps

    Hello and welcome!  Threat intelligence processes can enhance an organisation’s ability to proactively understand and respond to potential security threats, sometimes before they even become an incident. The process can vary hugely, here are some of the key steps in building your own threat intelligence capability. Define requirements and know your scope.  Requirements are the…

  • What services to protect in the azure cloud first?

    What services to protect in the azure cloud first?

    Hello and welcome back! While Azure provides a semi-secure cloud platform very dependent on the user configuration, the level of security risk associated with specific Azure services can also vary greatly depending on factors such as the purpose of the service, its configuration, and also to some degree the security culture within the organisation. There…