top of page
Search


When Politics Meets Cybersecurity: Are You Monitoring Your Business’s Risk Exposure?
Many organisations think about cyber risk in terms of technology, firewalls, phishing, ransomware, patching. Increasingly, your businesses public stance or the perceived political alignment of your leadership or staff may make you a target. How Political Positioning Becomes an Attack Surface Whether intentional or not, your business may appear to align with certain political ideologies, policies, or government initiatives. That exposure can come from: Official corporate posit

derekdodds
Oct 203 min read


Cyber Resiliency: A Practical Approach for Organizations of Every Size
Cyber resiliency is your organization’s ability to anticipate, withstand, and recover from a cyber security event, such as ransomware, a...

derekdodds
Oct 64 min read


The 3 Most Overlooked Security Risks in SMBs
For many SMBs, cybersecurity is often about balance, protecting the organisation while keeping operations lean and efficient. Leaders are...

derekdodds
Oct 32 min read


When’s the Last Time You Had an Objective Look at Your IR Plan?
As a keen sailor, I see the IR plan as the organisation’s lifejacket, you don’t want to put it on after you’ve already fallen overboard....

derekdodds
Sep 162 min read


Phishing Training Might Be Missing the Mark?
Recent findings from a study carried out by UC San Diego Health (Jan–Oct 2023) delivered some very interesting results: phishing...

derekdodds
Sep 81 min read


If You Don’t Eat Yer Meat, You Can’t Have Any Pudding
Pink Floyd wasn’t singing about cybersecurity, but their lyrics do offer us some advice. In business terms, I like to think the “meat” is...

derekdodds
Aug 251 min read


Do You Understand the Cybersecurity Risks to Your Manufacturing Business?
In manufacturing, especially in industries built on complex supply chains, precision equipment, and decades of operational expertise,...

derekdodds
Aug 142 min read


Beyond MFA: Strengthening Your Security Posture
Introduction Multi-Factor Authentication is the cornerstone of modern cybersecurity. Businesses often implement MFA believing it provides...

derekdodds
Aug 52 min read


Cybersecurity Without Context Is Not Effective
Protecting the business requires more than having a selection of security tools, it’s about knowing where and how to use them. While...

derekdodds
Jul 272 min read


Preparing Healthcare for the Quantum Data Security Threat: Why Action Is Needed Now
Introduction As quantum computing advances from theory to reality, the implications for data security in healthcare are profound. While...

derekdodds
Jul 212 min read


How a Threat Aware CMDB Transforms Cyber Risk Management
Introduction Amid the rapidly evolving world of cybersecurity, response time is key. The window between vulnerability discovery and...

derekdodds
Jul 132 min read


Why Attack Surface Assessments Are Critical to Modern Cybersecurity
Introduction In today’s threat landscape, organizations face a constant barrage of cyber threats targeting both internal and external...

derekdodds
Jul 73 min read


Redefining Network Segmentation for the Zero Trust Era: Dispatching with the Square Onion
Introduction For decades, network architects have built security using a model that I like to refer to as the square onion, layer upon...

derekdodds
Jun 284 min read


Password Managers: Essential Security Tool or Single Point of Failure?
Password requirements: 8 characters, one symbol, a haiku, and the blood of a unicorn. Okay, maybe not the last two, but passwords always...

derekdodds
Jun 193 min read


Selecting the Right Cybersecurity Framework for Your Business - Navigating NIST, ISO 27001, CyberSecure Canada, and More
As cyber threats continue to evolve, businesses of all sizes face increasing pressure to strengthen their security posture. The journey...

derekdodds
Jun 104 min read


The Hidden Dangers of Unrestricted Teams Federation: A Spear Phishing Playbook
In today’s fast-paced digital workplace, collaboration is key. Tools like Microsoft Teams make it easy for organizations to communicate...

derekdodds
May 272 min read


Cybersecurity Challenges for Small & Medium Businesses and How to Overcome Them
In today’s digital world, small and medium businesses are under increasing pressure to strengthen their cybersecurity posture. While...

derekdodds
May 263 min read


Protecting Legacy OT Systems: Why Segmentation and Governance Are Critical to Business Continuity
In an era where digital transformation is reshaping how businesses operate, Operational Technology (OT) environments remain a crucial,...

derekdodds
May 203 min read


Forecasting Software Risks in Critical Infrastructure by 2040
I was fortunate to catch Dr Charles Weir’s presentation at NCSS2025 in April. A collaborative study by Lancaster University and the...

derekdodds
May 121 min read


Palo Alto Auth Key Exceeds 80 Characters
I ran into an interesting feature this week while provisioning 4 PA-440's. The Panorama generated auth key was over 80 characters long...

derekdodds
Jan 19, 20221 min read
bottom of page
