top of page
Search


When Security Controls Quietly Increase Risk
Why overly complex cybersecurity measures can undermine the business When implementing cybersecurity solutions we need to think beyond protection, we must also consider risk, productivity, cost, and trust. Many organisations equate “more security” with “better security.” In practice, introducing overly complex or misaligned security controls can reduce resilience, reduce productivity, increase hidden risk, and erode operational efficiency, without leadership visibility. Secur

derekdodds
Dec 15, 20253 min read


When Politics Meets Cybersecurity: Are You Monitoring Your Business’s Risk Exposure?
Many organisations think about cyber risk in terms of technology, firewalls, phishing, ransomware, patching. Increasingly, your businesses public stance or the perceived political alignment of your leadership or staff may make you a target. How Political Positioning Becomes an Attack Surface Whether intentional or not, your business may appear to align with certain political ideologies, policies, or government initiatives. That exposure can come from: Official corporate posit

derekdodds
Oct 20, 20253 min read


Cyber Resiliency: A Practical Approach for Organizations of Every Size
Cyber resiliency is your organization’s ability to anticipate, withstand, and recover from a cyber security event, such as ransomware, a...

derekdodds
Oct 6, 20254 min read


The 3 Most Overlooked Security Risks in SMBs
For many SMBs, cybersecurity is often about balance, protecting the organisation while keeping operations lean and efficient. Leaders are...

derekdodds
Oct 3, 20252 min read


When’s the Last Time You Had an Objective Look at Your IR Plan?
As a keen sailor, I see the IR plan as the organisation’s lifejacket, you don’t want to put it on after you’ve already fallen overboard....

derekdodds
Sep 16, 20252 min read


Phishing Training Might Be Missing the Mark?
Recent findings from a study carried out by UC San Diego Health (Jan–Oct 2023) delivered some very interesting results: phishing...

derekdodds
Sep 8, 20251 min read


If You Don’t Eat Yer Meat, You Can’t Have Any Pudding
Pink Floyd wasn’t singing about cybersecurity, but their lyrics do offer us some advice. In business terms, I like to think the “meat” is...

derekdodds
Aug 25, 20251 min read


Do You Understand the Cybersecurity Risks to Your Manufacturing Business?
In manufacturing, especially in industries built on complex supply chains, precision equipment, and decades of operational expertise,...

derekdodds
Aug 14, 20252 min read


Beyond MFA: Strengthening Your Security Posture
Introduction Multi-Factor Authentication is the cornerstone of modern cybersecurity. Businesses often implement MFA believing it provides...

derekdodds
Aug 5, 20252 min read


Cybersecurity Without Context Is Not Effective
Protecting the business requires more than having a selection of security tools, it’s about knowing where and how to use them. While...

derekdodds
Jul 27, 20252 min read


Preparing Healthcare for the Quantum Data Security Threat: Why Action Is Needed Now
Introduction As quantum computing advances from theory to reality, the implications for data security in healthcare are profound. While...

derekdodds
Jul 21, 20252 min read


How a Threat Aware CMDB Transforms Cyber Risk Management
Introduction Amid the rapidly evolving world of cybersecurity, response time is key. The window between vulnerability discovery and...

derekdodds
Jul 13, 20252 min read


Why Attack Surface Assessments Are Critical to Modern Cybersecurity
Introduction In today’s threat landscape, organizations face a constant barrage of cyber threats targeting both internal and external...

derekdodds
Jul 7, 20253 min read


Redefining Network Segmentation for the Zero Trust Era: Dispatching with the Square Onion
Introduction For decades, network architects have built security using a model that I like to refer to as the square onion, layer upon...

derekdodds
Jun 28, 20254 min read


Password Managers: Essential Security Tool or Single Point of Failure?
Password requirements: 8 characters, one symbol, a haiku, and the blood of a unicorn. Okay, maybe not the last two, but passwords always...

derekdodds
Jun 19, 20253 min read


Selecting the Right Cybersecurity Framework for Your Business - Navigating NIST, ISO 27001, CyberSecure Canada, and More
As cyber threats continue to evolve, businesses of all sizes face increasing pressure to strengthen their security posture. The journey...

derekdodds
Jun 10, 20254 min read


The Hidden Dangers of Unrestricted Teams Federation: A Spear Phishing Playbook
In today’s fast-paced digital workplace, collaboration is key. Tools like Microsoft Teams make it easy for organizations to communicate...

derekdodds
May 27, 20252 min read


Cybersecurity Challenges for Small & Medium Businesses and How to Overcome Them
In today’s digital world, small and medium businesses are under increasing pressure to strengthen their cybersecurity posture. While...

derekdodds
May 26, 20253 min read


Protecting Legacy OT Systems: Why Segmentation and Governance Are Critical to Business Continuity
In an era where digital transformation is reshaping how businesses operate, Operational Technology (OT) environments remain a crucial,...

derekdodds
May 20, 20253 min read


Forecasting Software Risks in Critical Infrastructure by 2040
I was fortunate to catch Dr Charles Weir’s presentation at NCSS2025 in April. A collaborative study by Lancaster University and the...

derekdodds
May 12, 20251 min read
bottom of page
