Teaching Cyber Blog

Subscribe for news and updates




Tag: cybersecurity

  • Cybersecurity Home Project Ideas for All Levels

    Cybersecurity Home Project Ideas for All Levels

    No matter what level of experience you have working within the cyber security there is always opportunity for home project experiments.  These are great for helping to keep yourself and family secure but also help your employer secure their business too! Build a Secure Network.  Using existing equipment or buying new, configuring all your network…

  • Cybersecurity Career Advice to Students and Graduates

    Cybersecurity Career Advice to Students and Graduates

    If you are a student or graduate interested in working in cybersecurity, here are some valuable pieces of advice that I have learned working in the industry. Learn the fundamentals and foundations first, especially in areas like cloud security, application security, and risk management. The foundations will provide you with a base to build upon,…

  • Protecting your Finance department from cyber security attacks

    Protecting your Finance department from cyber security attacks

    Finance departments are often overlooked within organisations as they are seen as established mature areas of the business.  The reality is that they are prime targets of financial gain from hackers and cyber criminals.  How to improve the security and defend from threats? Firstly, use strong access controls, authentication and authorization processes to control access…

  • Intellectual Property Cybersecurity Checklist for SME and Enterprises

    Intellectual Property Cybersecurity Checklist for SME and Enterprises

    Protecting intellectual property doesn’t have to start with an expensive cyber security solution.  Thorough preparation and organisation of your data can provide some security and ongoing cost benefits when security expenditure is eventually required. 1. Identify and classify intellectual property, build an asset list. 2. Implement access controls based on job roles and responsibilities. 3.…

  • Protecting your Human Resources (HR) department from cyber security attacks

    Protecting your Human Resources (HR) department from cyber security attacks

    A quick guide to protecting your human resource departments from cyber security attacks.  HR is a target for sensitive employee data.  Maintaining the confidentiality, integrity, and availability of HR solutions, process and people is important and challenging. Employee data is central, protect employee personal data, including personal identifiers such as social security numbers, addresses, and…

  • Three step plan to protect containers

    Three step plan to protect containers

    Welcome and thank you for reading this article!  Protecting containers is essential to the security of a container-based application, data and associated services integrated with it. Where to start? This three step plan will help mitigate against the majority of threats, with the understanding container security is continuous with no real end stage. 1. Follow…

  • Cyber security laws and regulations for Western serving markets

    Cyber security laws and regulations for Western serving markets

    Cybersecurity laws and regulations vary across countries and the number is growing as nations cybersecurity mature.  The laws in this article are more specific to western and western serving markets and should always be considered, particularly with respect to an form of security assessment, process or compliance. General Data Protection Regulation (GDPR), applies to European…

  • What services to protect in the azure cloud first?

    What services to protect in the azure cloud first?

    Hello and welcome back! While Azure provides a semi-secure cloud platform very dependent on the user configuration, the level of security risk associated with specific Azure services can also vary greatly depending on factors such as the purpose of the service, its configuration, and also to some degree the security culture within the organisation. There…

  • How to introduce security into DevOps?

    How to introduce security into DevOps?

    Evolving from DevOps to DevSecOps, is it a ‘pipeline dream’ or something that can work within an organisation. This article covers the areas a business need to focus on to help make it happen. DevOps practices (combination of development and IT operations) can be critical to a business and its profitability, so it is important…

  • How to protect your CISO from cyber security threats?

    How to protect your CISO from cyber security threats?

    Security awareness for managers, leaders within cyber security. Protecting the Chief Information Security Officer (CISO) from cyber threats. CISO are responsible for an organisation’s overall security. There are some controls that can be used to help protect this role: Cybersecurity Awareness, the CISO should receive specific, regular training and education on the latest cyber security…

×