NIS2

Do want to learn more about NIS2? https://ccb.belgium.be/regulation/nis2 Fastlane towards NIS2 compliance? https://atwork.safeonweb.be/nl/tools-resources/nis2-snelstartgids Do you want to learn more about the CyFun Framework created by the Center for Cybersecurity Belgium? https://atwork.safeonweb.be/cyberfundamentals-toolbox Do you need help with all this? Contact me!

Information gathering

Where do I get my information? Podcasts Risky Business, Patrick Gray, https://podcasts.google.com/?feed=aHR0cHM6Ly9yaXNreS5iaXovcnNzLnhtbA&ep=14 Blueprint, John Hubbard, https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8xMTQyNzIwLnJzcw&ep=14 Defense In Depth, Allan Alford & David Spark, https://podcasts.google.com/?feed=aHR0cHM6Ly9kZWZlbnNlaW5kZXB0aC5saWJzeW4uY29tL3Jzcw&ep=14 Newsletters Integriti TL/DR sec Daniel Miessler Risky.biz Twitter

Security architecture anti-patterns

Nice write-up from the NCSC in the UK regarding common mistakes in designing IT systems and their administration. https://www.ncsc.gov.uk/whitepaper/security-architecture-anti-patterns Do you use the ‘browse-up’ method for system administration? In other words, do you use a so called ‘jump-box’ to manage your systems? Find out how you can avoid this!

Cunning phishing tactics

As you might know, phishing is the most widespread tactic to deliver malware to clients.This article discusses some new tactics and techniques used by adversaries to deliver their payload onto our computers. Stay safe and think before you click that link or open that document! https://www.pcrisk.com/internet-threat-news/16577-microsoft-reveals-fiendish-phishing-tactics