Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Cybersecurity foundations

Shift Security Left

Shifting Security Left is a paradigm that encourages a proactive, rather than reactive – approach to security. The term is in reference to the software

Read More »
Cyber threats & crime

Zero Click Hack Exposed

An interesting and concerning security in the news this week. It has been alleged that Israelli Cyber Surveillance Company, NSO’s software has been used by

Read More »
Cybersecurity foundations

Identity Theft

Identity theft is a major problem. It occurs when criminals collect enough of your personal information to convince people that they are you. What sort

Read More »
Cybersecurity foundations

Website trackers

Data hungry website We all know that websites are tracking us all of the time, as I mentioned the data tracking economy when I explored

Read More »
Cybersecurity foundations

Password management

Considering what I have learnt this week (in this post), I’ve decided it’s time to cast a critical eye over my own password management practices.

Read More »
Cybersecurity foundations

About passwords

How do people treat passwords? The Avast report about Americans and passwords makes for disturbing reading. https://press.avast.com/83-of-americans-are-using-weak-passwords  Many Americans use personal information such as partner’s

Read More »
Cybersecurity foundations

Unshredding a document

This week we were challenged to physically destroy some data. I’ve chosen to unshred a document. Not a special document , just some junk mail

Read More »
Cybersecurity foundations

Spot the Insider

For an activity this we were tasked with finding an example of an insider attack. An insider attack could be carried out by a true

Read More »
Cybersecurity foundations

The Essential Eight

Introduction Want to know how to protect yourself and limit the damage caused by a cyber attack? The Essential Eight was released by the Australian

Read More »