365labs Blog
Grab a Coffee
Should I reset the reset KRBTGT password in my Active Directory domain?
If the KRBTGT password is not reset regularly, it increases the risk of a security breach. If an attacker gains access to the KRBTGT password, they can create valid Kerberos tickets for any user in the domain, and use these tickets to gain access to resources on the network.
The scale of the ransomware problem
An overview of ransomware, notable examples of ransomware attacks, the scale of the issue, factors that perpetuate the problem, legal and ethical issues surrounding ransom payments, the role of cryptocurrencies, and potential strategies to break the cycle of ransomware attacks.
Does your business rely on 3G?
The 3G network, which has been a staple of mobile communication for over two decades, is slowly being phased out in favor of faster and more reliable 4G and 5G networks. In the United Kingdom, the country's communications regulator, OFCOM, has announced plans to switch off the 3G network.
What are the Microsoft PowerToys and are they just for power users?
Microsoft PowerToys is a collection of free utilities designed to improve productivity and enhance the Windows experience for users of all skill levels. These tools range from window management utilities to image manipulation tools and more. In this article, we will focus on ten PowerToys that cater to a wide array of users, and briefly mention some additional utilities that may be more suited for the "true" power users.
Recovering from Ransomware
Ransomware attacks have become increasingly common in recent years, causing significant damage to businesses of all sizes. A ransomware attack can leave a company’s sensitive data encrypted and inaccessible, preventing employees from performing their duties and severely impacting the organization's operations. Recovering from such an attack can be challenging, but it is possible with the right approach. In this article, we will discuss how a company can recover from a ransomware attack and why paying the ransom is not a good idea.
Small Businesses That Should be Thinking About Cybersecurity That May Not Be
Cybersecurity is no longer a luxury but a necessity for businesses of all sizes, in all geographies, we focus on the United Kingdom here. The rapid digitalization of various industries has increased the risk of cyberattacks, with small and medium-sized businesses often the most vulnerable. While many organizations understand the importance of cybersecurity, some may not realize how exposed they are.
Challenges facing UK law firms regarding cybersecurity
In recent years, cybersecurity has become an increasingly important issue for businesses across all industries, including law firms in the UK. This is due to the rise of cybercrime and the increasing sophistication of hackers. As a result, UK law firms face unique challenges when it comes to protecting their sensitive data. In this blog post, we will explore some of the key challenges facing UK law firms with regard to cybersecurity, and provide suggestions on how to mitigate these risks.
Navigating Remote Work in a Post-Pandemic World: Advantages, Obstacles, and Insights
The unprecedented COVID-19 pandemic compelled businesses and organisations to adjust to remote work set-ups swiftly. As the world gradually overcomes the pandemic and economies rebound, it is crucial for businesses to reflect on the remote work experiences and determine how to integrate these approaches into their long-term strategies. In this article, we will delve into the rewards and hurdles of remote work, drawing from the real-world experiences of businesses during the pandemic.
Protect Your Business Future
Data is the lifeblood of a successful small or medium-sized business (SMB). From customer information to financial records and intellectual property, your business relies on data to operate efficiently and effectively. But what would happen if you suddenly lost all that critical information?
What is it with websites and their infuriating password requirements?
Cumbersome password requirements imposed by many websites have left many users feeling frustrated and overwhelmed. Instead of placing the password burden on end users, it's high time websites adopt more user-friendly methods of securing user accounts.
IT Manager, Outsource, or why not both?
As a business owner, you're always looking for ways to improve your company's efficiency and productivity. One area that you may be considering is your IT department. Should you hire an IT manager to oversee all technology-related tasks, or should you outsource the work to an external company? In this blog post, we will discuss the pros and cons of each option and explore why combining the two may be the best choice for your business.
When to Consider SaaS, PaaS, or IaaS for Small Business Web Hosting
When it comes to hosting a website for a small business, there are several options available. Three popular options are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or Infrastructure-as-a-Service (IaaS). Each of these options has its advantages and disadvantages, and choosing the right one can be challenging. This blog post will explore when a small business should consider SaaS, PaaS, or IaaS for web hosting, with a focus on simplicity and usability.
The Artificial Intelligence Arms Race
The AI arms race has emerged as one of the most critical global issues of the 21st century. As nations compete to develop increasingly advanced AI technologies, the potential for a technological arms race has become a pressing concern.
3cx and supply chain attacks
In recent years, supply chain attacks have become an increasingly prevalent and concerning issue for businesses and individuals alike. A supply chain attack is a type of cyber attack that targets a company's or organization's supply chain, which is the network of businesses and individuals that contribute to the creation and delivery of a product or service.
For the attention of the Board
Cybersecurity breaches can lead to significant financial losses, legal liabilities, and reputational damage. It is therefore crucial for board members to take a pivotal role in cybersecurity and cyber resilience. In this article, we will discuss why board members must take responsibility for cybersecurity and what steps they can take to ensure their organizations are protected.
What are Microsoft 365 Copilot and Microsoft Security Copilot?
Microsoft 365 Copilot is a new AI assistant that uses machine learning to help users improve their productivity in a variety of ways. Copilot is available across Microsoft 365 apps and services, making it a powerful tool for users who want to get more out of their workday. So, what exactly is Microsoft 365 Copilot,
The General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union (EU) in May 2018 that governs the processing and storage of the personal data of EU residents. The GDPR aims to provide individuals with greater control over their personal data and to establish a harmonized data protection framework across the EU.